Java security: present and near future
نویسنده
چکیده
2 there has been strong and growing interest in Java's security as well as in new security issues raised by this technology's deployment. These concerns have reached the mainstream—the New York Times, the Wall Street Journal, and others have run stories on Java security. However, we must examine Java's trustworthiness comprehensively, from a broad dependability perspective, 3-6 not simply from the journalistic view. A simplistic statement such as " Java is [or is not] secure " doesn't come close to capturing the complexity of the issues involved. To pass judgment on whether Java is a trustworthy language or platform, we must precisely specify requirements of the overall system— in this case, computer systems and the global Internet infrastructure. Only then can we hope to demonstrate vigorously that the platform architecture satisfies or contributes to the satisfaction of the overall requirements, and that the platform's actual implementation satisfies the architecture's design requirement. Unfortunately, neither of these two crucial steps is feasible for security today. The shape and the characteristics of the national (or global) system infrastructure are evolving rapidly. Consequently, such widely used terms as " Internet security " cannot capture the essence of the trustworthiness required of such an infrastructure. (Admittedly, such terms were not very helpful in the past, either.) Moreover, though formal methods have been used successfully to verify some hardware devices, they are not sufficiently advanced to address correctness issues of large-scale software systems. Given this state of affairs, we must use an alternative (albeit less scientific and idealistic) set of criteria to examine platform trust-worthiness. From an industrial point of view, such criteria must include the following considerations: • Usability—To be ubiquitous and accepted in the marketplace, the platform must be easy to use for building small-and large-scale systems and applications. • Simplicity—To inspire confidence in its correctness, the platform cannot be too complex to analyze (by code inspection or testing, for example) for critical properties. • Adequacy—The platform must contain all essential features and building blocks for supporting higher-level trust-worthiness (security) requirements. • Adaptability—The platform must evolve with ease, following demand and market reality. Judged by these (perhaps biased) criteria, Java scores very favorably compared with other existing languages and programming systems. In particular, Java's platform independence greatly reduces the complexity— and thus the probability of design and implementation errors—of dealing with heterogeneous environments. The " write once, run everywhere " philosophy also helps improve …
منابع مشابه
An Analysis of the Local Resources Potential to Achieve Food Security in Jombang and Probolinggo Regencies East Java Indonesia
This study aims at analyzing the characteristics of the food need in the area of Jombang and Probolinggo regencies as well as developing a model of local superiority-based policy to achieve the food security. This study employs descriptive qualitative approach. This study is carried out in eight months in March to October 2015. The respondent of the study is the governmental staff of Jombang an...
متن کاملESC/Java2 as a Tool to Ensure Security in the Source Code of Java Applications
The paper shows how extended static checking tools like ESC/Java2 can be used to ensure source code security properties of Java applications. It is demonstrated in a case study on a simple personal password manager. In case of such an application the ensuring of security is one of the most important goals. We present the possible threats connected with the current state of the code and its poss...
متن کاملSoftware Security analysis, static and dynamic testing in java and C environment, a comparative study
The main language used is JAVA, regarded as one of the most object oriented language still create lot of error like stack overflow, illegal/inappropriate method overriding. I used tools confined to JAVA to test as how weak points in the code can be rectified before compiled. The byte code theft is difficult to be conquered, so it’s a better to get rid of it in the plain java code itself. The to...
متن کاملFindings Security Errors in Java Applications Using Lightweight Static Analysis
Application security is becoming increasingly important in Java. In this paper, we focus on security issues that frequently occur in enterprise Java components. We describe two commonly violated security patterns and show how such violations can be prevented with static analysis of the application source. We describe our techniques and experimentally evaluate them on a set of 10 large open-sour...
متن کاملJava Virtual Machine - Present and Near Future
At the heart of Java technology lies the Java Virtual Machine (JVM) the abstract computer which makes Java’s "write once, run anywhere" slogan a valid one. This paper introduces Java’s existing JVM features and the way they contribute to its overall portability. It also discusses the future direction of JVM as the characteristics of the overall system infrastructure are evolving rapidly with th...
متن کاملThe Evolution of Java Security
This paper provides a high-level overview of the development and evolution of Java security. Java is a maturing technology that has evolved from its commercial origins as a browser-based scripting tool. We review the various deployment environments in which Java is being targeted, some of its run-time characteristics, the security features in the current releases of the base technology, the new...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEEE Micro
دوره 17 شماره
صفحات -
تاریخ انتشار 1997