TY - GEN
T1 - Java for mobile devices
T2 - 21st Annual Computer Security Applications Conference, ACSAC 2005
AU - Debbabi, Mourad
AU - Saleh, Mohamed
AU - Talhi, Chamseddine
AU - Zhioua, Sami
PY - 2005/12/1
Y1 - 2005/12/1
N2 - Java 2 Micro-Edition Connected Limited Device Configuration (J2ME CLDC) is the platform of choice when it comes to running mobile applications on resource-constrained devices (cell phones, set-top boxes, etc.). The large deployment of this platform makes it a target for security attacks. The intent of this paper is twofold: First, we study the security architecture of J2ME CLDC. Second, we provide a vulnerability analysis of this Java platform. The analyzed components are: Virtual machine, CLDC API and MIDP (Mobile Information Device Profile) API. The analysis covers the specifications, the reference implementation (RI) as well as several other widely-deployed implementations of this platform. The aspects targeted by this security analysis encompass: Networking, record management system, virtual machine, multi-threading and digital right management. This work identifies security weaknesses in J2ME CLDC that may represent sources of security exploits. Moreover, the results reported in this paper are valuable for any attempt to test or harden the security of this platform.
AB - Java 2 Micro-Edition Connected Limited Device Configuration (J2ME CLDC) is the platform of choice when it comes to running mobile applications on resource-constrained devices (cell phones, set-top boxes, etc.). The large deployment of this platform makes it a target for security attacks. The intent of this paper is twofold: First, we study the security architecture of J2ME CLDC. Second, we provide a vulnerability analysis of this Java platform. The analyzed components are: Virtual machine, CLDC API and MIDP (Mobile Information Device Profile) API. The analysis covers the specifications, the reference implementation (RI) as well as several other widely-deployed implementations of this platform. The aspects targeted by this security analysis encompass: Networking, record management system, virtual machine, multi-threading and digital right management. This work identifies security weaknesses in J2ME CLDC that may represent sources of security exploits. Moreover, the results reported in this paper are valuable for any attempt to test or harden the security of this platform.
U2 - 10.1109/CSAC.2005.34
DO - 10.1109/CSAC.2005.34
M3 - Conference contribution
AN - SCOPUS:33846326296
SN - 0769524613
SN - 9780769524610
T3 - Proceedings - Annual Computer Security Applications Conference, ACSAC
SP - 235
EP - 244
BT - Proceedings - 21st Annual Computer Security Applications Conference, ACSAC 2005
Y2 - 5 December 2005 through 9 December 2005
ER -