Protecting Java component integrity against Trojan Horse programs

  • Authors:
  • Marcel Winandy;Armin B. Cremers;Hanno Langweg;Adrian Spalka

  • Affiliations:
  • Department of Computer Science III, University of Bonn, Roemerstrasse 164, D-53117 Bonn, Germany;Department of Computer Science III, University of Bonn, Roemerstrasse 164, D-53117 Bonn, Germany;Department of Computer Science III, University of Bonn, Roemerstrasse 164, D-53117 Bonn, Germany;Department of Computer Science III, University of Bonn, Roemerstrasse 164, D-53117 Bonn, Germany

  • Venue:
  • Integrity and internal control in information systems V
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

We discuss how integrity of components of Java applications can be protected. Intrinsic and extrinsic protection mechanisms are employed. Capabilities of the Java application programming interface include permissions and signed JAR files. The strength of the methods depends on the operating system in which the Java virtual machine is embedded. Possible attacks by Trojan horse programs on component integrity are given and an approach to prevent or detect these is presented.