Towards the Hardware Accelerated Defensive Virtual Machine - Type and Bound Protection

نویسندگان

  • Michael Lackner
  • Reinhard Berlach
  • Johannes Loinig
  • Reinhold Weiss
  • Christian Steger
چکیده

Currently, security checks on Java Card applets are performed by a static verification process before executing an applet. A verified and later unmodified applet is not able to break the Java Card sand-box model. Unfortunately, this static verification process is not a countermeasure against physical run-time attacks corrupting the control or data flow of an applet. In this piece of work, designs for Java Card Virtual Machines are investigated in relation to their ability to perform run-time security checks. These security checks are accelerated by hardware units and performed in parallel to CPU instructions that are executing concurrently. Attacks on the Java operand stack and local variables, which are elementary components for the Virtual Machine, are thwarted by type and bound protection. To enable these hardware checks, different designs of a defensive Java Card Virtual Machine are compared to their overheads on a prototype platform.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Investigating the Effect of Virtual Reality Environment and Intelligent Control Panel on the Rehabilitation of Upper Limb

Introduction: Occupational therapy and performing specific motor activities are among the healing processes for injured people that should be followed by patients in need after the doctor’s prescription. The objective of this study was to evaluate the effect of using virtual reality environments and interacting with hardware designed for the treatment and rehabilitation of patients with upper l...

متن کامل

Investigating the Effect of Virtual Reality Environment and Intelligent Control Panel on the Rehabilitation of Upper Limb

Introduction: Occupational therapy and performing specific motor activities are among the healing processes for injured people that should be followed by patients in need after the doctor’s prescription. The objective of this study was to evaluate the effect of using virtual reality environments and interacting with hardware designed for the treatment and rehabilitation of patients with upper l...

متن کامل

A Genetic Based Resource Management Algorithm Considering Energy Efficiency in Cloud Computing Systems

Cloud computing is a result of the continuing progress made in the areas of hardware, technologies related to the Internet, distributed computing and automated management. The Increasing demand has led to an increase in services resulting in the establishment of large-scale computing and data centers, in addition to high operating costs and huge amounts of electrical power consumption. Insuffic...

متن کامل

Drawing the Red Line in Java

Software-based protection has become a viable alternative to hardware-based protection in systems based on languages such as Java, but the absence of hardware mechanisms for protection has been coupled with an absence of a user/kernel boundary. We show why such a “red line” must be present in order for a Java virtual machine to be as effective and as reliable as an operating system. We discuss ...

متن کامل

Towards array bound check elimination in Java TM virtual machine language

In a standard Java implementation, a Java program is compiled into Java bytecode, which is then interpreted by Java virtual machine (JVM). We refer to the bytecode language as Java virtual machine language in this paper. For safety concerns, JVM performs run-time array bounds checking to detect out-of-bounds array access. Unfortunately , this practice can be prohibitively expensive in cases inv...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012