{"title":"针对Java小程序的基于规则的过滤","authors":"Pietro Iglio, F. Fraticelli, Luigi Giuri","doi":"10.1109/CSAC.1998.738592","DOIUrl":null,"url":null,"abstract":"Java has been designed with a sophisticated security model that prevents applets downloaded from an untrusted network to attack the local system. However, malicious applets could exploit bugs in the virtual machine in order to gain access to system resources to perform unauthorized operations. The paper discusses the problem of intercepting such applets through a set of filtering rules that can be applied before a fixed version of the virtual machine is released. Moreover, we present an implementation of a filtering tool that can be used either as a firewall extension or as a virtual machine extension.","PeriodicalId":426526,"journal":{"name":"Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)","volume":"41 1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1998-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Rule-based filtering for Java applets\",\"authors\":\"Pietro Iglio, F. Fraticelli, Luigi Giuri\",\"doi\":\"10.1109/CSAC.1998.738592\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Java has been designed with a sophisticated security model that prevents applets downloaded from an untrusted network to attack the local system. However, malicious applets could exploit bugs in the virtual machine in order to gain access to system resources to perform unauthorized operations. The paper discusses the problem of intercepting such applets through a set of filtering rules that can be applied before a fixed version of the virtual machine is released. Moreover, we present an implementation of a filtering tool that can be used either as a firewall extension or as a virtual machine extension.\",\"PeriodicalId\":426526,\"journal\":{\"name\":\"Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)\",\"volume\":\"41 1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1998-12-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSAC.1998.738592\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSAC.1998.738592","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Java has been designed with a sophisticated security model that prevents applets downloaded from an untrusted network to attack the local system. However, malicious applets could exploit bugs in the virtual machine in order to gain access to system resources to perform unauthorized operations. The paper discusses the problem of intercepting such applets through a set of filtering rules that can be applied before a fixed version of the virtual machine is released. Moreover, we present an implementation of a filtering tool that can be used either as a firewall extension or as a virtual machine extension.