Secure execution of Java applets using a remote playground
- 1 January 2000
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Software Engineering
- Vol. 26 (12) , 1197-1209
- https://doi.org/10.1109/32.888632
Abstract
Mobile code presents a number of threats to machines that execute it. We introduce an approach for protecting machines and the resources they hold from mobile code and describe a system based on our approach for protecting host machines from Java 1.1 applets. In our approach, each Java applet downloaded to the protected domain is rerouted to a dedicated machine (or set of machines), the playground, at which it is executed. Prior to execution, the applet is transformed to use the downloading user's web browser as a graphics terminal for its input and output and so the user has the illusion that the applet is running on her own machine. In reality, however, mobile code runs only in the sanitized environment of the playground, where user files cannot be mounted and from which only limited network connections are accepted by machines in the protected domain. Our playground thus provides a second level of defense against mobile code that circumvents language-based defenses. The paper presents the design and implementation of a playground for Java 1.1 applets and discusses extensions of it for other forms of mobile code, including Java 1.2.Keywords
This publication has 12 references indexed in Scilit:
- Java security: from HotJava to Netscape and beyondPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- XTV: a framework for sharing X Window clients in remote synchronous collaborationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Experience with secure multi-processing in JavaPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Secure execution of Java applets using a remote playgroundPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Blocking Java applets at the firewallPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Joust: a platform for liquid softwareComputer, 1999
- Proof-carrying codePublished by Association for Computing Machinery (ACM) ,1997
- Safe kernel extensions without run-time checkingPublished by Association for Computing Machinery (ACM) ,1996
- Making paths explicit in the Scout operating systemPublished by Association for Computing Machinery (ACM) ,1996
- Scale and performance in a distributed file systemACM Transactions on Computer Systems, 1988