Full metadata record
DC FieldValueLanguage
dc.contributor.authorSchönefeld, Marc-
dc.date.accessioned2006-08-17T14:50:04Z-
dc.date.available2006-08-17T14:50:04Z-
dc.date.issued2004-07-
dc.identifier.citationSchönefeld, Marc: Anti-Patterns in JDK Security and Refactorings. In Flegel, U.; Meier, M. (Eds.): Proc. of the International GI Workshop on Detection of Intrusions and Malware & Vulnerability Assessment, number P-46 in Lecture Notes in Informatics, pp. 175-186, Dortmund, Germany, July 2004, Köllen Verlag; ISBN 3-88579-365-X.de
dc.identifier.urihttp://hdl.handle.net/2003/22789-
dc.identifier.urihttp://dx.doi.org/10.17877/DE290R-2015-
dc.description.abstractThis paper underlines the importance of security awareness whilst programming Java applications. Several problems in current JDK implementations are demonstrated that allow to undermine the security of Java applications. Coding errors and quality problems in current Java distributions create possibilities to create covert channels, cause resource blocking and denial-of-service attacks. To make things worse Java components are often deployed according to the AllPermissions antipattern with non-restrictive security settings, which allows bugs on the system layer to be exploited by attackers. Coping with this antipattern from the user side is connected with the definition of adequate permission sets. A tool that automates this time consuming task is presented as a refactoring for the AllPermission antipattern.de
dc.format.extent309841 bytes-
dc.format.mimetypeapplication/pdf-
dc.language.isoen-
dc.publisherGesellschaft für Informatikde
dc.relation.ispartofDIMVA 2004, July 6-7, Dortmund, Germanyen
dc.relation.ispartofseriesLecture Notes in Informatics;P-46en
dc.subjectVulnerability Assessmenten
dc.subject.ddc004-
dc.titleAnti-Patterns in JDK Security and Refactoringsen
dc.typeTextde
dc.type.publicationtypeconferenceObjecten
dcterms.accessRightsopen access-
Appears in Collections:Papers

Files in This Item:
File Description SizeFormat 
DIMVA2004-Schoenefeld.pdf302.58 kBAdobe PDFView/Open


This item is protected by original copyright



This item is protected by original copyright rightsstatements.org