Security analysis of mobile java

Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Java 2 Micro-Edition Connected Limited Device Configuration (J2ME CLDC) is the platform of choice when it comes to running mobile applications on resource-constrained devices (cell phones, set-top boxes, etc.). The large deployment of this platform makes it a target for security attacks. The intent of this paper is twofold: First, we study the security architecture of J2ME CLDC, then we provide a vulnerability analysis of this Java platform. The analyzed components are: Virtual machine, CLDC API and MIDP (Mobile Information Device Profile) API. The analysis covers the specifications, the reference implementation (RI) as well as several other widely-deployed implementations of this platform.

Original languageEnglish
Title of host publicationProceedings - Sixteenth International Workshop on Database and Expert Systems Applications, DEXA 2005
Pages231-235
Number of pages5
DOIs
Publication statusPublished - 1 Dec 2005
Externally publishedYes
Event16th International Workshop on Database and Expert Systems Applications, DEXA 2005 - Copenhagen, Denmark
Duration: 22 Aug 200526 Aug 2005

Publication series

NameProceedings - International Workshop on Database and Expert Systems Applications, DEXA
Volume2006
ISSN (Print)1529-4188

Conference

Conference16th International Workshop on Database and Expert Systems Applications, DEXA 2005
Country/TerritoryDenmark
CityCopenhagen
Period22/08/0526/08/05

Fingerprint

Dive into the research topics of 'Security analysis of mobile java'. Together they form a unique fingerprint.

Cite this