Poison Java: antidotes to malicious code are required above and beyond Java's own antigens if the programming language is to be immunized against security breaches
Article Abstract:
Java's strength is its platform independence, which allows Java applets to run in a Java-enabled web browser on any type of computer hardware or operating system, but its active content makes use of the system's resources and could potentially erase data or copy and transmit it to a third party. Malicious Java applets are able to modify the system, access private data, tie up the system's resources, or antagonize the user. Firewalls, data encryption and other traditional network security techniques cannot prevent malicious Java code. Different web browsers implement Java in different ways, so security flaws need to be identified for each specific browser. Two popular Java security solutions are digital signatures and sandboxes, which run code of unknown origin separately and limit what the code may do. Java 1.1 featured support for digital signatures, which encode binary files with a digital code, or signature, unique to a developer, distributor or certifier. A combination of techniques must be used to protect systems from potential malicious code in Java applets.
Publication Name: IEEE Spectrum
Subject: Engineering and manufacturing industries
ISSN: 0018-9235
Year: 1999
User Contributions:
Comment about this article or add new information about this topic:
A foundation of knowledge
Article Abstract:
The IBM Corp.'s Webfountain is dedicated to the purpose of blending the information, opinion, and falsehood that roils the Internet every second of every day. Its key ability to understand documents is to employ a more flexible approach to structuring data, than putting it in a database.
Publication Name: IEEE Spectrum
Subject: Engineering and manufacturing industries
ISSN: 0018-9235
Year: 2004
User Contributions:
Comment about this article or add new information about this topic:
Anatomy of malice
Article Abstract:
Malicious software mostly falls into one of three classes: viruses, worms and Trojan horses. The structures, methods of operation and history of malicious software is discussed, and prevention countermeasures are described.
Publication Name: IEEE Spectrum
Subject: Engineering and manufacturing industries
ISSN: 0018-9235
Year: 2001
User Contributions:
Comment about this article or add new information about this topic:
- Abstracts: Protecting the UPS from battery failure: UPS are installed to prevent power failure meaning business failure, so the last thing you need is the ups itself going down when it is pressed into action
- Abstracts: An integrated inventory model for a single vendor and multiple buyers with ordering cost reduction. An inventory control model using fuzzy logic
- Abstracts: Controller corrects vibrations on the fly. Changing ratios by wire beats a human. Charting a road to the future
- Abstracts: Cycles optimization: The equivalent annuity and the NPV approaches. Revision of industrial supply conditions and game theory
- Abstracts: Winging it. Let it entertain them; options for a rear-seat entertainment system to end the "Are we there yet?" chorus before it begins this summer