@book{JRC31377, editor = {}, address = {London}, year = {2005}, author = {Rrushi J}, isbn = {}, abstract = {In this paper are discussed cyber-attacks to Distributed Object Applications that originate from RMI client programs running on malicious hosts. These cyber-attacks may be performed by a cyberattacker who has full control on his machine and intentionally uses debugging instrumentation, that potentially may be based on the Java Platform Debugging Architecture, to take full control over the RMI client bytecodes while they execute on the JVM of his machine, properly modify these bytecodes eventually adding new ones, and attack the RMI server through such a corrupted RMI client. The objective of the information reported in this paper is to raise the security awareness of distributed application developers and support them in protecting their applications from such a threat. }, title = {Protecting Distributed Object Applications from Corruption of Class Bytecodes on Client Side }, url = {}, volume = {}, number = {}, journal = {}, pages = {263-272}, issn = {}, publisher = {SPRINGER VERLAG}, doi = {} }