2000
DOI: 10.1109/32.888632
|View full text |Cite
|
Sign up to set email alerts
|

Secure execution of Java applets using a remote playground

Abstract: Mobile code presents a number of threats to machines that execute it. We introduce an approach for protecting machines and the resources they hold from mobile code, and describe a system based on our approach for protecting host machines from Java 1.1 applets. In our approach, each Java applet downloaded to the protected domain is rerouted to a dedicated machine (or set of machines), the playground, at which it is executed. Prior to execution the applet is transformed to use the downloading user's web browser … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2000
2000
2007
2007

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(13 citation statements)
references
References 15 publications
0
13
0
Order By: Relevance
“…This problem will be solved with classical techniques such as executing remote code in a sandbox or a remote playground [8].…”
Section: Security Issuesmentioning
confidence: 99%
“…This problem will be solved with classical techniques such as executing remote code in a sandbox or a remote playground [8].…”
Section: Security Issuesmentioning
confidence: 99%
“…The basic idea of this approach is to setup a sacrificial machine with only minimum connections to the rest of the net, and execute all Java code on it [13]. While this approach can certainly be used to put a limit on the damage a malicious applet can wreak, it also foregoes the ability to use the Java language for distributed computing, and it feels like a step back.…”
Section: Defensive Approachesmentioning
confidence: 99%
“…An alternative approach to achieve isolation between different applications is to give each one its own virtual machine, and run each virtual machine in a different process in an underlying OS [23,27]. For instance, most operating systems can limit a process's heap size or CPU consumption.…”
Section: Introductionmentioning
confidence: 99%