Browse > Article
http://dx.doi.org/10.13089/JKIISC.2002.12.3.15

A Technique for Detecting Malicious Java Applet Using Java-Methods Substitution  

이승수 (ETRI부설 국가보안기술연구소 응용기술연구부)
오형근 (ETRI부설 국가보안기술연구소 응용기술연구부)
배병철 (ETRI부설 국가보안기술연구소 응용기술연구부)
고재영 (ETRI부설 국가보안기술연구소 응용기술연구부)
박춘식 (ETRI부설 국가보안기술연구소 응용기술연구부)
Abstract
Java applet, executed in user's web browsers which is via proxy server on web sever, can approach client files or resources, so it is necessary to secure against malicious java applet. Currently, the previous security countermeasures against malicious java applet use two ways: one is making a filter system to detect malicious java applet hewn in proxy, the other is that establishes another security java virtual machine. However, the first one can not detect unknown malicious java applet, and the other one nay increase loads, because it decides whether there is malicious or not after implementing java applet on proxy server. In this paper, after inserting monitoring function to java applet on proxy server using java-methods substitution and transfer it to user to detect malicious java applet, we propose a technique for detecting malicious java applet that can detect the unknown malicious java applet with reducing loads
Keywords
Java Applet; Java-Methods Substitution;
Citations & Related Records
연도 인용수 순위
  • Reference
1 SurfinShield, http://www.finjan.com/ product_home.cfm, Data Sheet
2 Shlomo Touboul and Nachshon Gal, "System and Method for Attaching a downloadable Security Proflle to a down-loadable," Patent US6154844, Nov. 28, 2000
3 임영주, '자바 시큐리트에 대한 고찰', http://www.javastudy.co.kr/docs/
4 InterScan AppletTrap. http://www.antivirus.com/products/isat/, Data Sheet
5 Gilad Golan, 'Security Monitor,' PatentUS5974549, Oct. 26, 1999
6 Shuang Ji. Santa Clara and Calif, 'Computer Network Malicious Code Scanner,' Patent US5983348. Nov. 9, 1999
7 Surfingate, http://www.finjan.com/product_home.com, Data Sheet
8 이인영. 'Java Security와 Cryptography Architecture' http://www.javastudy.co.kr/docs/
9 Shlomo Touboul, 'Sytem and Method for Protecting a Computer and a Network from Hostile Downloadables,' Patent US6092194, Jul. 18, 2000
10 이정효. "'Executable Contents 보안" http://www.kisa.or.kr/
11 이병각. '이동코드 보안,' http://www.kisa.or.kr/
12 AJay Chander, John C.Mitchell and Insik Shin, 'Mobile Code Security by Java Bytecode Instrumentation,' IEEE, 2001