Security in the Large: Is Java's Sandbox Scalable?
نویسندگان
چکیده
Java security, sandbox, large scale application, mandatory access control Using Java security as an example, this paper tries to draw attention to the various issues of security in large scale distributed systems, some of which are often ignored when the security mechanisms are designed. Even though a lot of work has been done on Java security, we argue in this paper that due to weaknesses inherent in the Java approach to building sandboxes, Java security is not suitable when applied to large-scale distributed systems.
منابع مشابه
JVM-Portable Sandboxing of Java's Native Libraries
Although Java provides strong support for safety and security, native libraries used in a Java application can open security holes. Previous work, Robusta, puts native libraries in a sandbox to protect the integrity and security of Java. However, Robusta’s implementation modifies the internals of OpenJDK, a particular implementation of a Java Virtual Machine (JVM). As such, it is not portable t...
متن کاملAccess control in ultra-large-scale systems using a data-centric middleware
The primary characteristic of an Ultra-Large-Scale (ULS) system is ultra-large size on any related dimension. A ULS system is generally considered as a system-of-systems with heterogeneous nodes and autonomous domains. As the size of a system-of-systems grows, and interoperability demand between sub-systems is increased, achieving more scalable and dynamic access control system becomes an im...
متن کاملA Usability Study of Security Policy Management
.Abstract. Security policy management is a difficult and security-critical task. We have evaluated Java's policytool with a usability study to see how well it can support users in setting up an appropriate security policy. The Java policytool is a graphical user interface tool integrated into Sun Microsystem Inc.'s Java 5.0 distribution for setting up security policies that can enable e.g. appl...
متن کاملAutomated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities
Malware has been recognized as one of the major security threats in the Internet. Previous researches have mainly focused on malware’s internal activity in a system. However, it is crucial that the malware analysis extracts a malware’s external activity toward the network to correlate with a security incident. We propose a novel way to analyze malware: focus closely on the malware’s external (i...
متن کاملLarge-scale image analysis using docker sandboxing
With the advent of specialized hardware such as Graphics Processing Units (GPUs), large scale image localization, classification and retrieval have seen increased prevalence. Designing scalable software architecture that co-evolves with such specialized hardware is a challenge in the commercial setting. In this paper, we describe one such architecture (Cortexica) that leverages scalability of G...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1998