Java Security Notes (6)

Source: Internet
Author: User
Tags object serialization
The five segments of notes take me three days to recall the basic knowledge of Java Security mechanisms -- sandbox. but I like the language itself. because I cocould control everything. once your administrator set up environment for you, when you hope to get more authorization and right, you have to write e-mail, fill application form and ask your boss to approve it. what's troublesome nuts!
So I will start new topic -- Java ages Security. this is more interesting for me and more comfortable to express what I try to explain. but I don't discuss those exceptions such as native code that always trigger the problem as it's more like C/C ++ code instead of Java code. as we all know, C/C ++'s secuirty reply on yourself majorly.
Please remember these: public, protect, private, final. they are much better than C ++. because programmer haven' t pointer to help them to snoop on hidden components in the class. another good news is that Java forbid to arbitrarily cast class type unless there is some relationship between them such as derivative. of course, you still can not stop memory Snoop. what a pity!
The second bonus or maybe danger is object serialization. The file stored in hard disk. A lot of crazy guys cocould read it after trying with several times. How can we communicate with it? One is to avoid from using it. The other is to encode them and override the writer and loader function.
The third tool is Javac, compiler tool. It can help to check security but weak functionality.
The forth trouble is from Java language itself. this problem is like Hook technique which have been used in network card capture application or API replacement. from the Java view, this is more easier than C ++. because there is one virtual machine used for application. sun adds one bytecode verifier into virtual machine to detect specified upted code or illegal code. but Java uses special skill to do such detection -- to verify bytecode only when the bytecode is refreshing. but it's not the runtime check. the real runtime check does not check class attribute but check array bounds and object casting.
As author said that the notion of security in Java is pervasive, its implementation is equally pervasive.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.