Java Applet Security

Abstract

Java's early growth was spurred by code downloadable over a network, better known as APPLETS. Applet security has evolved with the growth of Java, and today is a source of frequent confusion due to the variety of Java versions, commercially available browsers, and plug-ins. Applets are automatically (an applet may not give any visual signal of its existence or execution) downloaded across the network and run on the host machine when a user accesses in a browser a web page containing applet. A user coming across malicious applets is within the realms of possibility. The Java Sandbox model provides you an environment, where you could welcome any code from any source. But when the code from an untrusted source runs Sandbox restricts the code from taking any actions that could possibly harm your system. It terms of applets the restrictions means that applets will be unable to determine information about each other; each applet is given its own memory space to run. Java byte code modification technique is used to insert extra run-time test into java applets. This technique is used to restrict applet behavior or, potentially, insert code appropriate to profiling and other monitoring efforts.

Authors and Affiliations

Chirag Gulati, Ayushi Mishra, Chetna Mahajan

Keywords

Related Articles

Review on Capturing User Intention from Content Base Image Retrieval

the search engine returns thousands of images ranked by the keywords extracted from the surrounding text. It is well known that text-based image search suffers from the ambiguity of query keywords. The keywords provided...

Application of Global Maximum Power Point Tracking (MPPT) in Solar PV Array

This paper illustrates the Maximum Power Point Tracking (MPPT) of PV arrays, the efficiency of solar panels, and the change that occurs to the power output of a solar array under PSC.in this paper detail given about to...

Multivariate Correlation Analysis for Detection of Denial-Of-Service Attack

In networking systems, many Web servers, Database servers, Cloud computing servers and so on, are now under threats from network attackers. One of most common types of attack is denial-of-service (DoS) attacks which cau...

Variable Speed BLDC Motor Drive Using PIC Microcontroller

This paper aims to design and implementation of BLDC motor speed control based on the POT variation. This project is mainly concerned on BLDC motor speed control system by using microcontroller PIC 16F877A. Motor speed...

“Marker-Controlled Watershed Transform in Digital Mammogram Segmentation”

Breast cancer is one of the major causes of death among women thus; to detect the breast cancer in digital mammogram, firstly we have to segment it properly. Segmentation refers to the process of partitioning a digital...

Download PDF file
  • EP ID EP18637
  • DOI -
  • Views 255
  • Downloads 7

How To Cite

Chirag Gulati, Ayushi Mishra, Chetna Mahajan (2014). Java Applet Security. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(9), -. https://www.europub.co.uk/articles/-A-18637