Preview

Java Card Security

Powerful Essays
Open Document
Open Document
6460 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Java Card Security
Java Card Security: How Smart Cards and Java Mix
Section 1 -- Java Security Goes Both Ways | |
There are a large and growing number of Java systems running the gamut from Java gizmos such as Java rings, through smart cards with built-in Java interpreters (the subject of this chapter), to complete Java Development Kits and Integrated Development Environments (IDEs). Java is simultaneously making in-roads on many fronts. In distributed systems, Java-based servers and servlets are becoming as common as Java clients. As with any platform meant to interact in a networked world, there are security concerns with each flavor of Java.
These concerns take on a new urgency when it comes to e-commerce. When electronic blips are money, the stakes change considerably. It may be an inconvenience to lose a Web server that amounts to fancy brochureware; it is something else entirely if the Web server and its associated backend perform all customer transactions.
The security concerns raised by e-commerce are a large enough topic in their own right that there is no way we can do them justice here. Of course, because Java is commonly used at all levels in e-commerce systems, the risks we identify have serious e-commerce implications. This is especially true for Java cards.
Counterintuitively, Java is both growing and shrinking at the same time. On one hand, the JDK, now up to Java 2, is doubling in size with each major release. Just to complicate matters, at the same time as the explosive growth of the code base is occurring, the security architecture is undergoing major reorganization. Chapter 2, "The Base Java Security Model: The Original Applet Sandbox," and Chapter 3, "Beyond the Sandbox: Signed Code and Java 2," detail the new model. On the other hand, embedded Java systems like Card Java 2.x strip Java functionality down to bare bones. The security model is not immune to this effect and has been deeply affected by Java's migration to smart cards.
These two diverse

You May Also Find These Documents Helpful

  • Better Essays

    E-commerce networks are prone to external attacks. They present large targets with valuable internal data, such as customer information, credit card numbers and bank accounts, supply chain information, pricing, and so on. They must allow legitimate, worldwide users to connect and interact with the network. Speed is a priority to end users, where long transaction times or slow site navigation will motivate them to move to a different vendor. Security is another priority. Customers must be assured that their privacy and confidential information will remain intact and guarded.…

    • 890 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Chapter 10 Chapter 11 Chapter 12 Chapter 13 Chapter 14 Chapter 15 Chapter 16 Chapter 17 Chapter 18 Chapter 19 Chapter 20 Chapter 21 Chapter 22 Chapter 23 Chapter 24 Chapter 25 Chapter 26 Chapter 27 An Introduction to Hardware, Software, and the Internet An Introduction to Software Development Objects and Classes Algorithms Java Syntax and Style Data Types, Variables, and Arithmetic Boolean Expressions and if-else Statements Iterative Statements: while, for, do–while Implementing Classes and Using Objects Strings Class Hierarchies and Interfaces Arrays…

    • 3908 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    Project Part 1 Task 1

    • 295 Words
    • 2 Pages

    Cited: Jang, M. (2011). Security Strategies in Linux Platforms and Applications. Jones & Bartlett Learning.…

    • 295 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Csia 301 - Syllabus

    • 4678 Words
    • 19 Pages

    Prerequisite: CMIS 102. A comprehensive introduction to the protection of business information and the systems that support business processes. The objective is to identify common threats and attacks employed against Web-accessible applications, analyze the role of security models and architectures, explain the role of cryptography, and analyze issues related to security management and network security.…

    • 4678 Words
    • 19 Pages
    Good Essays
  • Good Essays

    6. Data hiding, which means that critical data stored inside the object is protected from code outside the object is accomplished in Java by _____.…

    • 1518 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Davidson, Mary Ann. Security Seminar. “Information Security.” Lecture. Chief Security Officer. Oracle Government, Education and Healthcare, Oracle Corporation, Reston, VA: October 16, 2001.…

    • 26520 Words
    • 107 Pages
    Good Essays
  • Satisfactory Essays

    Bibliography: Kim, David and Michael G. Solomon. “Fundamentals of Information Systems Security.”, 15-42. Sunbury, MA: jones and Bartlett Learning, 2012.…

    • 517 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    college algebra

    • 1862 Words
    • 11 Pages

    References: Wm. Arthur Conklin, G. W. (2012). Principles of Computer Security: CompTIA Security+™ and Beyond (Exam SY0-301), Third Edition. In G. W. Wm. Arthur Conklin, _Principles of Computer Security: CompTIA Security+™ and Beyond (Exam SY0-301), Third Edition_ (p. Chapter 20). McGraw-Hill Company.…

    • 1862 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Eclipse by Ibm

    • 20806 Words
    • 84 Pages

    upported by a cross-section of the software industry including individuals and corporations, the Eclipse Foundation is dedicated to providing enterprise application developers the latest tools, platforms and frameworks to support the software development lifecycle. Since 2004, the Eclipse Foundation has worked to provide a standardized framework that developers are able to extend to suit their needs. For some, Eclipse is all a developer may need, but for others, it may only be a starting point. Fortunately, that's the power of Eclipse--it can be modified with other products to meet almost any development requirement. Fortunately, as the Eclipse pioneer, IBM has chosen not only to support the Eclipse Foundation,…

    • 20806 Words
    • 84 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The current trend is that it is becoming increasingly easier to attack computer systems. More people with limited computer knowledge (script kiddies) can carry out attack on poorly maintained systems, because attack tools are increasingly accessible and usable. A manifestation of this is the movement of attack tools from command-line to graphical-based tools. The Iris Network Traffic Analyzer (formally known as SpyNet) [5], for example, is a GUI (Graphical User Interface), packet sniffing tool. Information system security is important in this computer age. It goes without saying that information management is…

    • 3306 Words
    • 13 Pages
    Satisfactory Essays
  • Powerful Essays

    A Quick Start Guide to DrJava A Quick Start Guide to DrJava Table of Contents 1. Introduction ................................................................................................................... 1 2. Getting Ready to Use DrJava ............................................................................................ 2 Downloading the JDK ................................................................................................. 2…

    • 8017 Words
    • 33 Pages
    Powerful Essays
  • Good Essays

    ABSTRACT Computers are an important part of everyday life to many people across the world. Computers in the hands of consumers who lack the knowledge of protection tools and who have limited administrator skills are vulnerable to virus attacks. These systems are extremely valuable to intruders as they have lot of secret personal information about the users. Attackers exploit vulnerabilities in the software layers to install malicious programs on user machines to steal secret data for financial gains. Security protocols have been in place for some time to counter the threat posed by the attacks. However, despite the presence of such measures, the number of attacks on consumer computers is growing rapidly. A recent trend in attacks has been the attempt to disable security protocols in place at the host machine. This type of attack leaves the host computer completely defenseless and vulnerable to many further exploits through the Internet. To ensure the continuous functioning of the security protocols, a software-based solution is proposed in this thesis. The solution involves camouflaging the security processes to avoid being detected and disabled by malicious programs. To protect the program in the memory from being tampered or altered with, various modules are employed in this solution. The modules provide obscurity, diversity, randomization and migration of code to hide the location and presence of the security processes.…

    • 17792 Words
    • 72 Pages
    Good Essays
  • Powerful Essays

    Java Exam

    • 5195 Words
    • 21 Pages

    Java is a general-purpose, concurrent, class-based, object-oriented computer programming language that is specifically designed to have as few implementation dependencies as possible. It is intended to let application developers "write once, run anywhere" (WORA), meaning that code that runs on one platform does not need to be recompiled to run on another. Java applications are typically compiled to bytecode (class file) that can run on any Java virtual machine (JVM) regardless of computer architecture. Java is, as of 2012, one of the most popular programming languages in use, particularly for client-server web applications, with a reported 9 million developers. Java was originally developed by James Gosling at Sun Microsystems (which has since merged into Oracle Corporation) and released in 1995 as a core component of Sun Microsystems' Java platform. The language derives much of its syntax from C and C++, but it has fewer low-level facilities than either of them.…

    • 5195 Words
    • 21 Pages
    Powerful Essays
  • Better Essays

    Remote Method Invocation

    • 1965 Words
    • 8 Pages

    I1 Introduction Distributed systems require entities which reside in different address spaces, potentially on different machines, to communicate. The Java™ system (hereafter referred to simply as “Java”) provides a basic communication mechanism, sockets [13]. While flexible and sufficient for general communication, the use of sockets requires the client and server using this medium to engage in some application-level protocol to encode and decode messages for exchange. An alternative to sockets is Remote Procedure Call (RPC) [13].…

    • 1965 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Java Ring

    • 568 Words
    • 3 Pages

    The Java Ring is an extremely secure Java-powered electronic token with a continuously running, unalterable real-time clock and rugged packaging, suitable for many applications. The jewel of the Java Ring is the Java iButton -- a one-million transistor, single chip trusted microcomputer with a powerful Java Virtual Machine (JVM) housed in a rugged and secure stainless-steel case.…

    • 568 Words
    • 3 Pages
    Good Essays

Related Topics