An official website of the European Union How do you know?      
European Commission logo
JRC Publications Repository Menu

Protecting Distributed Object Applications from Corruption of Class Bytecodes on Client Side

cover
In this paper are discussed cyber-attacks to Distributed Object Applications that originate from RMI client programs running on malicious hosts. These cyber-attacks may be performed by a cyberattacker who has full control on his machine and intentionally uses debugging instrumentation, that potentially may be based on the Java Platform Debugging Architecture, to take full control over the RMI client bytecodes while they execute on the JVM of his machine, properly modify these bytecodes eventually adding new ones, and attack the RMI server through such a corrupted RMI client. The objective of the information reported in this paper is to raise the security awareness of distributed application developers and support them in protecting their applications from such a threat.
2006-01-23
SPRINGER VERLAG
JRC31377
Language Citation
NameCountryCityType
Datasets
IDTitlePublic URL
Dataset collections
IDAcronymTitlePublic URL
Scripts / source codes
DescriptionPublic URL
Additional supporting files
File nameDescriptionFile type 
Show metadata record  Copy citation url to clipboard  Download BibTeX
Items published in the JRC Publications Repository are protected by copyright, with all rights reserved, unless otherwise indicated. Additional information: https://ec.europa.eu/info/legal-notice_en#copyright-notice