• Title/Summary/Keyword: JDK(Java Development Kit)

Search Result 3, Processing Time 0.018 seconds

Applet Control using Java Bytecode Modification on the Internet Communication (인터넷 통신상에서 자바 바이트 코드 수정을 이용한 애플릿 제어)

  • 김광준;나상동;배용근
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.1
    • /
    • pp.90-99
    • /
    • 2003
  • Java applets are downloaded from web server through internet and executed in Java Virtual Machine of clients' browser. Before execution of java applets, JVM checks bytecode program with bytecode verifier and performs runtime tests with interpreter. However, these tests will not protect against undesirable runtime behavior of java applets, such as denial of service attack, email forging attack, URL spoofing attack, and annoying sound attack. In order to protect malicious applets, a technique used in this paper is java bytecode modification. This technique is used to restrict applet behavior or insert code appropriate to profiling or other monitoring efforts. Java byte modification is divided into two general forms, class-level modification involving subclassing non-final classes and method-level modification used when control over objects from final classes or interface. This paper showed that malicious applets are controlled by java bytecode modification using proxy server. This implementation does not require any changes in the web sever, JVM or web browser.

A Study on Applet Control on the Internet Communication using Java Bytecode (자바 바이트 코드를 이용한 인터넷 통신의 애플릿 제어)

  • 김문환;나상동
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.5C
    • /
    • pp.523-531
    • /
    • 2003
  • Java applets are downloaded from web server through internet and executed in Java Virtual Machine of clients'browser. Before execution of java applets, JVM checks bytecode program with bytecode verifier and performs runtime tests with interpreter. However, these tests will not protect against undesirable runtime behavior of java applets, such as denial of service attack, email forging attack, URL spoofing attack, or annoying sound attack. In order to protect malicious applets, a technique used in this paper is java bytecode modification. This technique is used to restrict applet behavior or insert code appropriate to profiling or other monitoring efforts. Java byte modification is divided into two general forms, class-level modification involving subclassing non-final classes and method-level modification used when control over objects from final classes or interface. This paper showed that malicious applets are controlled by java bytecode modification using proxy server. This implementation does not require any changes in the web sever, JVM or web browser.

위피 모바일 플랫폼 상에서 동작하는 모바일 게임 제작

  • Hwang, Jin-Uk;Jo, Jun-Hwi;Kim, Tae-Hyeong;Im, Jae-Hong;Yang, Gyu-Sik
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.2
    • /
    • pp.83-86
    • /
    • 2006
  • 모바일 플랫폼이 WIPI라는 표준 플랫폼으로 2004년 2월 WIP2.0으로 규격화되어 컨텐츠 개발 시간 및 비용의 최소화와 빠른 단말기 개발 공정으로 원활한 단말기 공급 그리고 1회의 컨텐츠 개발로 모든 이동 통신 사업자에 공급등 여러 가지 측면에서 장점을 가지게 되었다. 이러한 WIPI의 우수성을 우리가 직접 사용해 눈으로 확인 해보기 위해 모바일 컨텐츠 중에서 가장 활발하게 개발되고 있는 게임을 제작해 보았다.

  • PDF