Secure execution of Java applets using a remote playground
@article{Malkhi1998SecureEO, title={Secure execution of Java applets using a remote playground}, author={Dahlia Malkhi and Michael K. Reiter}, journal={Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186)}, year={1998}, pages={40-51} }
Mobile code presents a number of threats to machines that execute it. We introduce an approach for protecting machines and the resources they hold from mobile code, and describe a system based on our approach for protecting host machines from Java 1.1 applets. In our approach, each Java applet downloaded to the protected domain is rerouted to a dedicated machine (or set of machines), the playground, at which it is executed. Prior to execution, the applet is transformed to use the downloading…Â
Figures from this paper
77 Citations
Spout: a transparent distributed execution engine for Java applets
- Computer ScienceProceedings 20th IEEE International Conference on Distributed Computing Systems
- 2000
The design, implementation, and performance measurements of the first Spout prototype are described, which also incorporates run-time resource monitoring mechanisms to counter denial-of-service attacks.
DISSECT: DIStribution for SECurity Tool
- Computer ScienceISC
- 2001
DIStribution for SECurity Tool is proposed and implemented, an architecture based on the above partitioning (dissection) strategy, for Java 1.1, which relieves the developers from actually writing distributed applications by distributing the application automatically, according to designated sensitivities of application portions.
Secure Mobile Code Execution Service
- Computer ScienceLISA
- 2006
A commercial system called SEES that secures the execution of mobile code that comes into a host computer as an email attachment or as a web document downloaded through an anchor link by running them on a separate guinea pig machine rather than on the user machine, and takes an isolation approach to the secure mobile code execution problem.
Spout: a transparent proxy for safe execution of Java applets
- Computer ScienceIEEE J. Sel. Areas Commun.
- 2002
The detailed design, implementation, and performance measurements of the first Spout prototype are described, which also incorporates run-time resource monitoring mechanisms to counter denial-of-service attacks.
Mobile Code Security
- Computer ScienceIEEE Internet Comput.
- 1998
The article summarizes the relative merits of each techniques and concluded that each of these techniques offers something different, and the best approach is probably a combination of security mechanisms.
A flexible and extensible security framework for Java code
- Computer Science
- 1999
JSEF has a hierarchical group concept that supports the definition and propagation of access policies, offers additive and subtractive permissions and policy exceptions, and supports system-wide security policies that users must adhere to but can tailor to their needs.
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments
- Computer ScienceNDSS
- 2005
This paper presents an approach for realizing a safe execution environment (SEE) that enables users to “try out” new software (or configuration changes to existing software) without the fear of damaging the system in any manner, and develops an efficient technique for implementing the commit operation.
A Novel Approach for Untrusted Code Execution
- Computer ScienceICICS
- 2007
This paper focuses on the execution model of SVEE and the security evaluation for this model, which enables users to "try out" untrusted software without the fear of damaging the system in any manner.
Alcatraz: An Isolated Environment for Experimenting with Untrusted Software
- Computer ScienceTSEC
- 2009
This article develops two different implementation approaches, one in user-land and the other in the OS kernel, for realizing a safe-execution environment that enables users to “try out” new software without the fear of damaging the system in any manner.
Nested Java processes: OS structure for mobile code
- Computer ScienceACM SIGOPS European Workshop
- 1998
Alta, a prototype Java-based system patterned on Fluke, a highly structured, hardware-based OS, is presented and its features appropriate to mobile code are reported on, including hierarchical resource management and flexible object sharing.
References
SHOWING 1-10 OF 57 REFERENCES
Java security: from HotJava to Netscape and beyond
- Computer ScienceProceedings 1996 IEEE Symposium on Security and Privacy
- 1996
This work examines the Java language and both the HotJava and Netscape browsers which support it, and finds a significant number of flaws which compromise their security.
Experience with secure multi-processing in Java
- Computer ScienceProceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183)
- 1998
This work experimented with using the Java platform as a multiprocessing, multi user environment and proposed improvements to several aspects of the Java technology architecture, including its security features.
JRes: a resource accounting interface for Java
- Computer ScienceOOPSLA '98
- 1998
It is argued that, in order to realize its full potential in applications dealing with untrusted code, Java needs a flexible resource accounting interface, and the design and prototype implementation of such an interface --- JRes --- is presented.
Java Virtual Machine
- Computer Science
- 1997
This text is a comprehensive programming guide for the Java Virtual Machine, providing an overview and reference of the JVM, and it enbles users to create their own implementations of theJVM or write their own compilers that create Java object code.
Extensible security architectures for Java
- Computer ScienceSOSP
- 1997
This work describes and analyzes three implementation strategies for interposing security policies in software-based security systems, and builds a name space management system as an add-on to Microsoft Internet Explorer.
Blocking Java applets at the firewall
- Computer ScienceProceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security
- 1997
This paper explores the problem of protecting a site on the Internet against hostile external Java applets while allowing trusted internal applets to run and describes a new attack on certain sophisticated firewalls that is most effectively realized as a Java applet.
Java Operating Systems : Design and Implementation
- Computer Science
- 1998
This work describes the technical issues that arise when implementing a process model in Java and lays out the design choices for managing resources, and describes the solutions that are exploring in two complementary projects, Alta and GVM.
The Java Virtual Machine Specification
- Computer Science
- 1996
This second edition specifies the newest version of the Java virtual machine and provides a fascinating view into the inner workings of theJava 2 platform.
Security of Web Browser Scripting Languages: Vulnerabilities, Attacks, and Remedies
- Computer ScienceUSENIX Security Symposium
- 1998
It is shown that if such a security framework had been integrated into the respective scripting languages from the very beginning, the probability of preventing the multiple security flaws, that were identified, would have been greatly increased.
Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2
- Computer ScienceUSENIX Symposium on Internet Technologies and Systems
- 1997
This paper describes the new security architecture that has been implemented aspart of JDK1.2, the forthcoming JavaTM Development Kit, and introduces the concept of protection domain and a few related security primitives that help to make the underlying protection mechanism more robust.