Java is an ideal platform for implementing mobile code systems, not only because of its portability but also because it is designed with security in mind. Untrusted Java programs can be statically analyzed and validated. The program's behavior is then monitored to prevent potentially malicious opera
Weaknesses in Java bytecode verifier
- Publisher
- Elsevier Science
- Year
- 1996
- Tongue
- English
- Weight
- 139 KB
- Volume
- 1996
- Category
- Article
- ISSN
- 1353-4858
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
The efficient execution of Java programs presents a challenge to hardware and software designers alike. The difficulty, however, lies with the Java bytecodes. Their model of a simplistic, platform-independent stack machine is well-suited for portability, though at the expense of execution speed. Var
In the standard Java implementation, a Java language program is compiled to Java bytecode and this bytecode is then interpreted by the Java Virtual Machine. Since bytecode may be written by hand, or corrupted during network transmission, the Java Virtual Machine contains a bytecode veri er that perf
One of the most promising approaches to Java acceleration in embedded systems is a bytecode-to-C ahead-of-time compiler (AOTC). It improves the performance of a Java virtual machine (JVM) by translating bytecode into C code, which is then compiled into machine code via an existing C compiler. One im
The author points out that Laih and Yen's multisignature scheme and Hwang, Chen and Chang's multisignature scheme do not satisfy their security requirements.