Show simple item record

dc.contributor.advisorUmphress, David
dc.contributor.advisorHamilton, Drewen_US
dc.contributor.advisorHendrix, Deanen_US
dc.contributor.authorShah, Rahulen_US
dc.date.accessioned2008-09-09T21:15:06Z
dc.date.available2008-09-09T21:15:06Z
dc.date.issued2005-12-15en_US
dc.identifier.urihttp://hdl.handle.net/10415/203
dc.description.abstractSecurity of the software applications has become a critical issue as software is now used in almost all sectors parts of our day to day life. There is always an underlying threat that a malicious user may be able to access classified information, intellectual information or secret algorithms by exploiting the software applications in many possible ways. The research described here examines the possible security threats to any stand-alone software applications developed in Java. The Java bytecode adheres to a well-defined class file format as described in the JVM specifications, and this makes the bytecode more vulnerable. The bytecode vulnerability taxonomy is developed and can be used to increase our overall understanding of the bytecode vulnerabilities. The focus of this research is to conduct a vulnerability assessment of Java bytecode in order to reveal its vulnerabilities. As part of case study, the class files are exploited to carry out intellectual penetration and component penetration attacks followed by the validations.en_US
dc.language.isoen_USen_US
dc.subjectComputer Science and Software Engineeringen_US
dc.titleVulnerability Assessment of Java Bytecodeen_US
dc.typeThesisen_US
dc.embargo.lengthNO_RESTRICTIONen_US
dc.embargo.statusNOT_EMBARGOEDen_US


Files in this item

Show simple item record