• Title/Summary/Keyword: JAVA

Search Result 2,685, Processing Time 0.047 seconds

A Technique for Detecting Malicious Java Applet Using Java-Methods Substitution (메서드 치환을 이용한 악성 자바 애플릿 탐지 기법)

  • 이승수;오형근;배병철;고재영;박춘식
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.3
    • /
    • pp.15-22
    • /
    • 2002
  • Java applet, executed in user's web browsers which is via proxy server on web sever, can approach client files or resources, so it is necessary to secure against malicious java applet. Currently, the previous security countermeasures against malicious java applet use two ways: one is making a filter system to detect malicious java applet hewn in proxy, the other is that establishes another security java virtual machine. However, the first one can not detect unknown malicious java applet, and the other one nay increase loads, because it decides whether there is malicious or not after implementing java applet on proxy server. In this paper, after inserting monitoring function to java applet on proxy server using java-methods substitution and transfer it to user to detect malicious java applet, we propose a technique for detecting malicious java applet that can detect the unknown malicious java applet with reducing loads

A Study of Temple on Java Island (인도네시아 자바 사원 연구)

  • GA, Jong Su
    • SUVANNABHUMI
    • /
    • v.5 no.2
    • /
    • pp.101-126
    • /
    • 2013
  • The place where models of Indonesian templed and sculpture remain in best condition is in central Java. Central Java was a center of culture from the 8th century to the 9th century. After the mid-10th century, a dynasty moved from central Java to eastern Java, because of frequent volcanic explosions and illness. Eastern Java became the center of politics and culture until the 16th century, when Islamic culture gained superiority. The classical temples of Indonesia before the rise of Islam are called 'Candi', which we can divide into the western Java period (?~8th century), the central Java period (8th~10th century), the eastern Java period (10th~16th century).

  • PDF

Implementation of Loyalty System using Java Card (Java Card을 이용한 마일리지 통합 관리 시스템 구현)

  • 백장미;강병모;홍인식
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.2
    • /
    • pp.231-238
    • /
    • 2002
  • As electronic commerce is becoming more popular on the Internet, smart cards have been used for safe transfers and transactions on I-commerce popularly. Especially, Java Card considered as a COS for the next generation must take advantage of the good points of Java Language by using this language and making programs asked for by various demands. In this paper, we proposed efficient management system of mileage on the Internet using Java Card. The system has security for data and the simplicity of application development by Java Card cryptography. The system is an independent program saved un Java Card and can calculate and save mileage, although the characteristic of the mileage is different from others through the calculating Process of the Card. Also, the system is developed to encourage the efficiency of a system after comparing and contrasting between established systems and the newly designed one in simulation.

  • PDF

SecureJS : A Secure JavaSpace based on Jini2.0 (SecureJS : Jini2.0 기반의 안전한 JavaSpace)

  • Yu Yang-Woo;Moon Nam-Doo;Jung Hye-Young;Lee Myung-Joon
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.999-1008
    • /
    • 2004
  • The Jini system provides an infrastructure to facilitate a programmer to develop distributed systems. As one of the Jini services, JavaSpare has been used as a repository which is accessible publicly in the Java distributed environment. Although JavaSpace could give a useful method for saving and sharing java object, it would not be applicable to develop a distributed system requiring access securities for the objects because JavaSpare does not support secure access control. In this paper, we present a secure JavaSpare service based on Jini2.0 named SeureJS, which strengthens the security weakness of JavaSpare. The system consists of ObjectStore to store Java objects, AccessManager to control access of ObjectStore and KeyManager to manage public keys.

Mutagen4J: Effective Mutant Generation Tool for Java Programs (Mutagen4J: 효과적인 Java 프로그램 변이 생성 도구)

  • Jeon, Yiru;Kim, Yunho;Hong, Shin;Kim, Moonzoo
    • Journal of KIISE
    • /
    • v.43 no.9
    • /
    • pp.974-982
    • /
    • 2016
  • Mutation analysis (or software mutation analysis) generates variants of a target program by injecting systematic code changes to the target program, and utilizes the variants to analyze the target program behaviors. Effective mutation analyses require adequate mutation operators that generate diverse variants for use in the analysis. However, the current mutation analysis tools for Java programs have limitations, since they support only limited types of mutation operators and do not support recent language features such as Java8. In this study, we present Mutagen4J, a new mutant generation tool for Java programs. Mutagen4J additionally supports mutation operators recently shown to generate various mutants and fully supports recent Java language features. The experimental results show that Mutagen4J generates useful mutants for analyses 2.3 times more than the existing Java mutation tools used for the study.

Developing Secure JavaSpace for Distributed Application Programs (분산 응용프로그램을 위한 안전한 JavaSpace의 개발)

  • 유양우;이명준
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04d
    • /
    • pp.352-354
    • /
    • 2003
  • 현재 분산 컴퓨팅 환경에서는 객체를 공유하기 위하여 Jini 서비스인 JavaSpace를 이용하여 다양한 응용 프로그램들이 개발되고 있다. 하지만 JavaSpace의 가장 큰 단점은 누구든지 객체를 저장하고, 또 그 객체를 읽거나 가져갈 수 있도록 설계되어있어 보안성이 매우 취약하다는 것이다. 본 논문에서는 이러한 JavaSpace를 보안등급에 따른 접근제어와 SSL SSL 패키지를 이용한 상호인증 모듈을 구현하여 JavaSpace의 새로운 보안모델을 제시하였으며, 개발된 안전한 JavaSpace를 이용하여 이동 에이전트간 통신 패러다임으로 적용하였다.

  • PDF

A Design of Event Service for JavaRmi Distributed Objects (JavaRmi 분산객체를 위한 이벤트 서비스의 설계)

  • 김현규;우양우;박양수;이명준
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10a
    • /
    • pp.412-414
    • /
    • 1998
  • 대규모의 분산 응용시스템은 일반적으로 다수의 구성요소로 이루어져 있으며, 그 구성요소간의 상호작용을 위해 필요한 이벤트의 전달 구조가 다소 복잡한 특성을 지닌다. 이러한 이벤트의 다중처리 문제는 나이도가 높은 구현기법 중 하나이므로, 보다 안정적인 분산 응용시스템을 효율적으로 개발하기 위해서는 이벤트의 다중처리를 위한 기반 시스템을 제작, 지원하는 것이 바람직하다. 본 논문에서는 Java에서 분산객체개념을 도입한 JavaRmi환경에서 이벤트의 체계적인 다중처리를 위한 서비스를 설계함으로써, Java개발자가 보다 안정적이고 효율적인 방법으로 분산응용시스템을 구축할 수 있도록 지원하기 위한 방법을 제안하고자 하였다. 본 논문에서는 제안한 JavaRmi이벤트 서비스 시스템은 JavaRmi를 기반으로 하여, JavaRmi시스템이 지닌 효율성과 대중성의 잇점을 충분히 활용할 수 있도록 설계되었다. 이러한 기본적인 잇점 이외에도 이벤트 서비스의 설계에 있어서 직관적인 인터페이스, 그룹별 이벤트 서비스의 생성과 관리 기능. 병행성과 동기화 도구 등의 기능을 추가하여, 분산 응용시스템의 개발시 자주 요구되는 이벤트 처리를 위한 Java 개발자의 노력을 최소화할 수 있도록 지원하고자 하였다.

  • PDF

The Design And Implementation of Educational Java Robot for Learning Motivation of Programmnig Language (프로그래밍언어 학습 동기유발을 위한 교육용 Java 로봇의 설계 및 구현)

  • Baek, Jeong-Hyun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2011.01a
    • /
    • pp.191-194
    • /
    • 2011
  • 본 연구에서는 Atmel사의 AVR 마이크로프로세서에 적합하게 개발된 Java 바이트코드 인터프리터인 NanoVM을 자체 개발한 마이크로로봇에 이식하여 Java 언어 전용 로봇을 구현하였다. 따라서 마이크로프로세서의 구조와 회로를 모르는 학생들도 로봇을 프로그래밍하면서 Java 언어를 효율적으로 학습할 수 있다. 더욱이 최근 학생들의 프로그래밍언어 학습 능력이 떨어지면서 컴퓨터 관련학과의 프로그래밍언어 교육이 많은 어려움을 겪고 있다. 따라서 학생들의 프로그래밍언어 학습 동기를 부여하고 창의 공학적 프로그래밍언어 교육프로그램의 도입이 필요한 시점에서 본 연구에서 개발한 Java 로봇은 많은 기여를 할 것으로 기대된다.

  • PDF

Design and Implementation of Role-Based Access Control Package for Java Applications (자바 애플리케이션을 위한 역할기반 접근제어 패키지의 설계 및 구현)

  • Oh, Se-Jong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.6
    • /
    • pp.1134-1141
    • /
    • 2006
  • Java is platform-independent and supports uniform solutions from mobile area (J2ME) to enterprise area (J2EE), so Java is a good development tool for the environment of heterogeneous machines and distributed applications. Java applications need access control module as a Java package. In this paper, we design and implement it. Therefore Java developers can reduce development time, and system managers easily do access control work. Proposed module is based on Role-Based Access Control (RBAC) model and includes a Java package and administration tool.

  • PDF

Compiling Haskell to Java via an Intermediate Code L (중간언어 L-코드를 이용한 Haskell-Java 언어 번역기 구현)

  • Choi, Kwang-Hoon;Han, Tai-Sook
    • Journal of KIISE:Software and Applications
    • /
    • v.28 no.12
    • /
    • pp.955-965
    • /
    • 2001
  • We propose a systematic method of compiling Haskell based on the spineless Tagless G-machine (STGM) for the Java, Virtual Machine (JVM) We introduce an intermediate language called L-code to identify each micro-operation of the machine by its instruction, Each macro operation of the machine is identified by a binding Each instruction of the L-code can be easily translated into Java statements. After our determination on representation and L-code program from a STG program is translated into Java program according to out compilation rules. Our experiment shows that the execution times of translated benchmarks are competitive compared with those in Haskell interpreter Hugs, particularly when Glasgow Haskell compiler's STG -level optimizations are applied.

  • PDF