Proceedings of the 31st Annual Computer Security Applications Conference 2015
DOI: 10.1145/2818000.2818003
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating the Flexibility of the Java Sandbox

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 24 publications
0
7
0
Order By: Relevance
“…Coker et al [15] evaluates how the security manager is used in benign applications. Based on this knowledge, they devise two rules to prevent most of the exploits from working: the security manager cannot be changed if it has been set by the application and a class may not directly load a more privileged class if a security manager is set.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Coker et al [15] evaluates how the security manager is used in benign applications. Based on this knowledge, they devise two rules to prevent most of the exploits from working: the security manager cannot be changed if it has been set by the application and a class may not directly load a more privileged class if a security manager is set.…”
Section: Related Workmentioning
confidence: 99%
“…Function has flag match exception is represented in Figure 16. In order for this function to return true all the following conditions must pass: (1) the maximum number of local variables and the maximum size of the stack must be the same for the current frame and the target frame (lines 4-5); (2) the current frame must have the UNINIT flag set to true (line 10); and (3) uninitialized objects are not used in the target frame (lines [14][15][16][17][18][19][20][21][22][23][24]. Figure 17 illustrates bytecode that satisfies the three conditions.…”
Section: B12 Looking At the Patchmentioning
confidence: 99%
“…First, the Java sandbox model affords so much flexibility that it leads to unnecessary vulnerabilities and bad security practices [6]. In the Java sandbox model, the JVM leverages a number of security permissions to restrict the behaviors of untrusted code for securing a benign application.…”
Section: Java Exploits Analysismentioning
confidence: 99%
“…The vendors of Java platforms fulfill the memory-safety property by containing the safe execution of untrusted bytecodes in a so-called sandbox and isolating them from one another. However, some research already has revealed that the sandbox is no longer unbreakable and may be bypassable in recent years [6][7][8][9]. An adversary can execute malicious bytecode inside the same protection domain as trusted code or tamper with benign bytecode and even replace it deliberately on the fly.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation