Java']Java for mobile devices: A security study

被引:0
|
作者
Debbabi, M [1 ]
Saleh, M [1 ]
Talhi, C [1 ]
Zhioua, S [1 ]
机构
[1] Concordia Univ, Comp Secur Lab, Concordia Inst Informat Syst Engn, Montreal, PQ, Canada
来源
21st Annual Computer Security Applications Conference, Proceedings | 2005年
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Java 2 Micro-Edition Connected Limited Device Configuration (J2ME CLDC) is the platform of choice when it comes to running mobile applications on resource-constrained devices (cell phones, set-top boxes, etc.). The large deployment of this platform makes it a target for security attacks. The intent of this paper is twofold: First, we study the security architecture of J2ME CLDC. Second, we provide a vulnerability analysis of this Java platform. The analyzed components are: Virtual machine, CLDC API and MIDP (Mobile Information Device Profile) API. The analysis covers the specifications, the reference implementation (RI) as well as several other widely-deployed implementations of this platform. The aspects targeted by this security analysis encompass: Networking, record management system, virtual machine, multi-threading and digital right management. This work identifies security weaknesses in J2ME CLDC that may represent sources of security exploits. Moreover the results reported in this paper are valuable for any attempt to test or harden the security of this platform.
引用
收藏
页码:210 / 219
页数:10
相关论文
共 50 条
  • [1] Security analysis of mobile Java']Java
    Debbabi, M
    Saleh, M
    Talhi, C
    Zhioua, S
    Sixteenth International Workshop on Database and Expert Systems Applications, Proceedings, 2005, : 231 - 235
  • [2] A Java']Java processor for mobile devices
    Tan, YY
    Man, LK
    Lun, MP
    Shing, YW
    Fong, AS
    ICCE: 2005 INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, DIGEST OF TECHNICAL PAPERS, 2005, : 437 - 438
  • [3] Accelerating embedded java']java for mobile devices
    Debbabi, M
    Mourad, A
    Talhi, C
    Yahyaoui, H
    IEEE COMMUNICATIONS MAGAZINE, 2005, 43 (09) : 80 - 85
  • [4] Mobile code security by Java']Java bytecode instrumentation
    Chander, A
    Mitchell, JC
    Shin, I
    DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL II, PROCEEDINGS, 2001, : 27 - 40
  • [5] Research on NTRU Algorithm for Mobile Java']Java Security
    Shen, Xiaoyu
    Du, Zhenjun
    Chen, Rong
    2009 INTERNATIONAL CONFERENCE ON SCALABLE COMPUTING AND COMMUNICATIONS & EIGHTH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING, 2009, : 366 - 369
  • [6] Streaming Java']Java applications to mobile computing devices
    Alagbhand, G
    Gnabasik, D
    ICWN'04 & PCC'04, VOLS, 1 AND 2, PROCEEDINGS, 2004, : 637 - 643
  • [7] Communication framework for Java']Java powered mobile devices
    Turecek, Tomas
    Saloun, Petr
    PROCEEDINGS OF THE 2009 FIFTH INTERNATIONAL CONFERENCE ON NEXT GENERATION WEB SERVICES PRACTICES, NWESP 2009, 2009, : 111 - +
  • [8] Extending the Java']Java Virtual Machine to enforce fine-grained security policies in mobile devices
    Ion, Iulia
    Dragovic, Boris
    Crispo, Bruno
    TWENTY-THIRD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2007, : 233 - +
  • [9] Mobile code security by Java']Java bytecode dependence analysis
    Bian, G
    Nakayama, K
    Kobayashi, Y
    Maekawa, M
    IEEE INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2004 (ISCIT 2004), PROCEEDINGS, VOLS 1 AND 2: SMART INFO-MEDIA SYSTEMS, 2004, : 923 - 926
  • [10] Security policy checker and generator for Java']Java mobile codes
    Kaiya, H
    Furukawa, H
    Kaijiri, K
    ENGINEERING INFORMATION SYSTEMS IN THE INTERNET CONTEXT, 2002, 103 : 255 - 264