Basic HTML version of Foils prepared September 1 99

Foil 32 Java Features -- It's (Hopefully) Secure

From Introduction to Java Language and Applets CPS406/606 Fall Semester 1999 -- September 2 99. by Nancy J. McCracken, Geoffrey C. Fox


1 Java bytecodes are shipped across the network and executed on client machines. Security is therefore a critical issue and strongly enforced in Java.
  • Java contains its own networking classes which are designed to be secure
2 Modifications of the C++ model such as eliminating pointer arithmetic and coercion were dictated mainly by the security requirements.
3 Most viruses are based on acquiring access to private/protected sectors of computer memory which is impossible in Java.
4 Java opcodes are executed at the client side by Java interpreter which operates exclusively on the virtual memory. Hence, unless there are security bugs in the Java interpreter itself, the model is safe and users cannot create security holes by incorrectly or maliciously written applets.
5 The bytecodes sent across network are verified at the client which prevents evil/corrupted classes from causing problems

in Table To:


© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Wed Sep 1 1999