Method and device for improving java sandbox security

A security and sandbox technology, applied in the field of computer security, can solve the problem of low Java sandbox security and achieve the effect of improving security

Active Publication Date: 2019-10-29
ALIBABA GRP HLDG LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the embodiment of the present application is to provide a method and device for improving the security of the Java sandbox to solve the problem of low security of the Java sandbox in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for improving java sandbox security
  • Method and device for improving java sandbox security
  • Method and device for improving java sandbox security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to enable those skilled in the art to better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the scope of protection of this application.

[0027] figure 1 It is a flowchart of a method for improving Java sandbox security provided in an embodiment of the present application. In this embodiment, the method includes the following steps:

[0028] S100: Check the authority of the code to be checked;

[0029] In the embodiment of the present application, the code to be c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present application discloses a method and a device for improving the security of a Java sandbox. The method for improving the security of the Java sandbox includes: performing a permission check on the code to be checked; judging whether there is a method for bypassing the permission check in the call stack of the code; if there is a method for bypassing the permission check method, it is judged whether there is a signature in the method in the call stack; if there is no signature, it is judged that the code to be checked has a security problem. The security of the Java sandbox can be improved by using the embodiment of the present application.

Description

technical field [0001] The present application relates to the technical field of computer security, in particular to a method and device for improving the security of a Java sandbox. Background technique [0002] In a cloud computing scenario, a user provides code written in Java language, and the cloud computing platform executes the code. Since the code often has many security problems (such as hacker's attack code), it is generally executed in a Java sandbox (JavaSandbox). [0003] The Java sandbox provides an execution environment that restricts code permissions according to policy files. During the code running process of the Java sandbox, when the method checkPermission is called, the security manager (Security Manager) of the Java sandbox will perform permission check on the code. The authority check is used to judge whether the method of each layer in the call stack has the authority in the policy file during the code running process, and the authority may include ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/53G06F9/445G06F21/57
CPCG06F9/44589G06F21/53G06F21/577G06F2221/033G06F9/45504
Inventor 李雪峰张雁冰
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products