Memory-Constrained Security Enforcement

Size: px
Start display at page:

Download "Memory-Constrained Security Enforcement"

Transcription

1 CHAMSEDDINE TALHI Memory-Constrained Security Enforcement Thèse présentée à la Faculté des études supérieures de l Université Laval dans le cadre du programme de doctorat en Informatique pour l obtention du grade de PhilosphiæDoctor (Ph.D.) FACULTÉ DES SCIENCES ET DE GÉNIE UNIVERSITÉ LAVAL QUÉBEC Avril 2007 c Chamseddine Talhi, 2007

2 Abstract With the proliferation of mobile, wireless and internet-enabled devices (e.g., PDAs, cell phones, pagers, etc.), Java is emerging as a standard execution environment due to its security, portability, mobility and network support features. The platform of choice in this setting is Java ME-CLDC. With the large number of applications available for Javaenabled network-connected devices, security is of paramount importance. Applications can handle user-sensitive data such as phonebook data or bank account information. Moreover, Java-enabled devices support networking, which means that applications can also create network connections and send or receive data. However, the considerable efforts of securing Java ME-CLDC are constrained by strict memory limitations of the target devices. This thesis aims at investigating memory-constrained security by analyzing the security of Java ME-CLDC and characterizing enforceable security policies. More precisely, the main objectives of our research are (1) evaluating and improving the security of Java ME-CLDC and (2) characterizing memory-constrained execution monitoring; an important class of security mechanisms. The main results of our research are the following: A security analysis of Java ME-CLDC. The two main contributions of this analysis are a vulnerability analysis and a risk analysis of the platform. The vulnerability analysis revealed the presence of vulnerabilities in the platform and showed how to improve the underlying security model. The risk analysis provided a seriousness estimation of the risks associated with the uncovered vulnerabilities. A characterization of memory-constrained execution monitoring. This characterization covers conventional monitors as well as more powerful monitors. The contribution of this characterization is mainly threefold. First, we defined a new automata class, called Bounded History Automata (BHA), to specify memoryconstrained EM enforcement. Second, we identified a new memory-directed taxonomy of EM-enforceable properties. Third, we investigated the enforcement of local properties using memory-constrained EM. This was performed by identifying BHA-enforceable local properties and explaining how to check whether an EM-enforceable policy is local or not.

3 Résumé Avec l extension des cellulaires, des réseaux sans fil et des périphériques mobiles, Java est devenu incontestablement l environnement d exécution le plus populaire. Cela est dû à ses aspects de sécurité, portabilité, mobilité et réseaux. Dans ce contexte, la plateforme de choix est Java ME-CLDC. Aussi, vu le nombre grandissant d applications Java destinées aux périphériques mobiles, la sécurité est devenue un enjeu crucial à considérer d une manière primordiale. Sécuriser ce type d applications devient plus qu impératif, notamment lorsque celles-ci manipulent des données confidentielles telles que les informations relatives aux transactions électroniques. Plus encore, les périphériques supportant Java se retrouvent souvent interconnectées, ce qui signifie que les applications peuvent ainsi créer des connexions réseaux et faire circuler des données critiques sur les canaux de communications. Cependant, les efforts considérables déployés afin de sécuriser Java ME-CLDC se heurtent à des contraintes de limitations strictes de l espace mémoire disponible, au sein des périphériques en question. Dans cette optique, cette thèse étudie le problème du maintien de la sécurité sous contraintes mémoire, et cela en analysant la sécurité de la plateforme Java ME-CLDC. Plus précisément, les objectifs majeurs de notre sujet de recherche sont (1) l évaluation et l amélioration de la sécurité de Java ME-CLDC et (2) la modélisation du monitoring d exécution (EM) en y introduisant des contraintes mémoire. À vrai dire, EM constitue une classe importante et omniprésente parmi tous les mécanismes de sécurité utilisés dans les plateformes Java. Les principaux résultats auxquels a abouti notre investigation sont les suivants : Une analyse de la sécurité de Java ME-CLDC. Les deux contributions principales qu a engendré cette analyse sont l analyse de vulnérabilité et l analyse des risques de cette plateforme. L analyse de vulnérabilité a révélé la présence de certaines faiblesses dans la plateforme, elle a montré également la manière permettant d améliorer son modèle de sécurité. Quant à l analyse des risques, elle a fourni une estimation de la gravité des risques associés aux vulnérabilités décelées.

4 Résumé iv Une modélisation du monitoring d exécution sous contraintes mémoire. Cette modélisation couvre aussi bien les moniteurs conventionnels que des moniteurs plus puissants. Les contributions principales qui découlent de notre modélisation sont les suivantes: Premièrement, nous avons défini une nouvelle classe d automates, dite Bounded History Automata (BHA) ou automates à historique borné, classe d automate qui permet de spécifier les mécanismes EM opérant sous contraintes mémoire. Deuxièmement, nous avons identifié une nouvelle taxonomie orientée mémoire des propriétés assurées par EM. Troisièmement, nous avons étudié les propriétés localement testables qui peuvent être assurées par des EMs opérant sous contraintes mémoire. Cela est fait en deux étapes: on commence par identifier les propriétés assurées par EMs qui sont de nature locale, ensuite on vérifie si ces dernières peuvent être spécifiées par des BHAs.

5 Acknowledgements I m very thankful to Pr. Nadia Tawbi and Pr. Mourad Debbabi for their advices, ideas and efforts to ensure a continuous supervision of this thesis. Their insights and encouragements have had a major impact on this research. Working with them was a very valuable experience for me. They deserve all my acknowledgements. I would like to thank Pr. Guy Tremblay, Béchir Ktari, and Pascal Tesson who honored me by accepting to review this thesis. I strongly believe that their questions, remarks and suggestions will be helpful for producing the final version of this thesis. I would like to express my ultimate gratitude to my wife Hakima who shared with me this thesis experience. She has been always happy to listen to and provide a positive feedback to my research ideas. She merits all my love and respect. I would like also to express all my acknowledgements to some exceptional colleagues who shared with me the precious years of my thesis: Hamdi Yahyaoui, Abdelouahed Gherbi, Lamia Ketari, and Mohamed Saleh from the Computer Security Laboratory (CSL) at Concordia University, Sami Zhioua, and Mahjoub Langar from the Languages, Semantics and Formal Methods Group (LSFM) at Laval University. I m also grateful to Lynda Goulet and Rachel Lapierre from the secretariat of the Computer science and Software engineering Department at Laval University. They are so kind and helpful to all the students. Finally, I would like to thank my friends Omar Seddiki, Mohamed Aoun-Allah, and Ashraf Badr for their encouragements, support and solidarity.

6 Acknowledgements vi To my parents To my wife Hakima To my daughter Rym To my family, friends and colleagues

7 Contents Abstract Résumé Acknowledgements Contents List of Tables List of Figures ii iii v vii xii xiii 1 Introduction Motivations Objectives Methodology Studying Java ME-CLDC and its Security Security Evaluation of Java ME-CLDC Characterizing Memory-constrained EM Enforcement Contributions Dissertation Structure I Java ME-CLDC: Platform and Security Model 9 2 Java ME-CLDC Introduction Java ME Platform Java Platforms Java ME Platform Overview Java ME-CLDC Virtual Machines Java Virtual Machine Java ME-CLDC JVMs Examples Executing Java ME-CLDC Applications

8 Contents viii MIDlet MIDlet Development MIDlet Packaging MIDlet Installation MIDlet Lifecycle MIDlet Persistent Storage Connected Limited Device Configuration Goals Requirements Scope Target Devices CLDC Specificities CLDC Libraries Mobile Information Device Profile (MIDP) Goals Requirements Scope MIDP Libraries Optional Packages Wireless Messaging API Mobile Media API Java ME Web Services API Location API for Java ME Conclusion Java ME-CLDC Security Introduction Java Security Sandbox Model Language Type Safety Bytecode Verification Security Policy Security Manager & Access Controller Secure Class Loading End-to-End Security Java ME-CLDC Security Bytecode Verification Off-Device Preverification On-Device Verification Sandbox Model Protecting System Classes

9 Contents ix Restrictions on Dynamic Class Loading Security Policy Sensitive APIs and Permissions Protection Domains Function Groups User Interaction Policy Security Policy File Security Policy Enforcement Requesting Permissions for MIDlet Suites Granting Permissions to MIDlets Trusting MIDlet Suites Signing MIDlet Suites Authenticating a MIDlet Suite Certificate Expiration and Revocation Keystores Persistent Storage Security End-to-End Security Security And Trust Services API Conclusion II Security Evaluation of Java ME-CLDC 74 4 Java ME-CLDC Security Analysis Introduction Overview Vulnerabilities Classification Code Inspection Security Testing Standard Security Evaluation Methodologies Enforcing Security Policies Methodology Advantages and Weaknesses of Java ME-CLDC Security Model Permissions Protection Domains Security Policy RMS Protection Reported Java ME-CLDC Flaws Siemens S55 SMS Problem Sun s MIDP Reference Implementation Problems Uncovered Vulnerabilities

10 Contents x KVM Vulnerabilities MIDlet Lifecycle Vulnerabilities Storage System Vulnerabilities Networking Vulnerabilities Thread Management Vulnerabilities Conclusion Java ME-CLDC Risk Analysis Introduction The MEHARI Approach Phase 1: Security Strategic Plan Phase 2: Operational Security Plan Phase 3: Company Operational Plan Application to Java ME-CLDC Security Strategic Plan Security Plan Operational Plan Conclusion III Memory-Constrained Execution Monitoring Enforceable Security Policies Introduction Definitions Security Policies Safety Liveness Security Mechanisms Static Analysis Execution Monitoring Program Rewriting Enforceable Security Policies Characterization Security Automata Edit Automata Abstraction-based Security Automata Computability Classification Discussion Bounded History Automata and Local Testability Introduction

11 Contents xi 7.2 Characterizing Constrained EM Enforcement Execution History Abstraction Formal Characterization Bounded History Automata Bounded Security Automaton Bounded Edit Automata Bounded-History-Based Taxonomy of EM-Enforceable Policies Memory-Constrained EM and Local Testability Local Properties BSA-Enforceable Local Properties BEA-Enforceable Local Properties Local EM-Enforceable Properties BHA-Enforceable Security Policies SHA-Enforceable Policies Bounded Availability Policies Transaction-based Policies Conclusion Conclusion 183 Bibliography 186 Index 198

12 List of Tables 2.1 The javax.microedition.rms Package Function Groups and User Settings Association of Function Groups with MIDP Permissions Association of Function Groups with Wireless Messaging API Permissions Association of Function Groups with Mobile Media API Permissions Actions Taken by the Certificate Verification Algorithm Authorization Actions Taken on the Basis of Authentication Results Impact Reduction Assessment Table Impact Assessment Table Seriousness Assessment Table Resource Classification Security Policy Disaster Scenarios Disaster Seriousness Assessment Summary of Risk Assessment Results for Disaster Scenarios Risk Assessment Results for Java ME-CLDC Vulnerabilities

13 List of Figures 2.1 Java Applications from Development to Execution Java Platform Editions Java ME Platform Java Virtual Machine Basic Components The Development of the midletname MIDlet MIDlet Packaging MIDlet Lifecycle Record Stores in MIDP The Original Java Sandbox Model The Extended Java Sandbox Model Verifying Classes in Java ME-CLDC Example of a Policy File Syntax Example of a Policy File Trusting a MIDlet Suite and Binding it to a Protection Domain Methodology to uncover Vulnerabilities Buffer Overflow Vulnerability KVM Overflow Vulnerability Exploiting the KVM Overflow Vulnerability MIDlet Lifecycle A MIDlet which does not follow the Expected Lifecycle A MIDlet Expecting MIDP 1.0 Exceptions Unfair Management of Persistent Storage A MIDlet Trying to Obtain all the Available Free Persistent Space on the Device Various Abstraction Levels in Mobile Devices Software A MIDlet Creating an Unshared Record Store A MIDlet Deleting an Unshared Record Store Belonging to another MIDlet Transferring MIDlet Jar File Transferring rms.db File The PRand.generateData Method

14 List of Figures xiv 4.16 The updateseed Method SMS Authorization Dialog The two Threads used to Send Unauthorized SMS Unsynchronized Access to Display Screen Different Phases of Application of the MEHARI Method (Source: MEHARI documentation) A scanner An edit automaton and the corresponding Büchi automaton Identifying local properties enforceable by BHA A bounded security automaton enforcing the Two-BA property A bounded edit automaton enforcing a transaction-based property

15 Chapter 1 Introduction 1.1 Motivations With the proliferation of mobile, wireless and internet-enabled devices (e.g., PDAs, cell phones, pagers, etc.), Java is emerging as a standard execution environment due to its security, portability, mobility and network support features. The platform of choice in this setting is Java ME-CLDC (Micro Edition-Connected Limited Device Configuration) [28, 101]. It is an enabling technology for a plethora of services and applications: games, messaging, presence and availability, web-services, mobile commerce, etc. Moreover, Java ME-CLDC allows the development of highly portable, minimum-footprint Java applications for resource-constrained, network-connected devices. The mobile devices targeted by Java ME-CLDC are mainly mobile phones and entry-level Personal Digital Assistants (PDAs). The number of mobile devices implementing Java ME-CLDC witnesses a huge increase. In fact, the latest list of mobile phones supporting this Java platform shows more than 60 phone models from various manufacturers. These numbers are expected to grow. According to IDC, a prestigious market research firm, only during 2006, more than billion Java-enabled cell phones have been deployed in the market which represents a 22.5 percent increase compared with With the large number of applications available for Java-enabled network-connected devices, security is of paramount importance. Applications can handle user-sensitive data such as phonebook data or bank account information. Moreover, Java-enabled devices support networking, which means that applications can also create network connections and send or receive data. Security in all of these cases should be a major

16 Chapter 1. Introduction 2 concern. Malicious code has caused a lot of harm in the computer world, and with phones having the ability to download and run applications there is an actual risk of facing this same threat. Currently, viruses for phones start to emerge (e.g., Cabir, Skulls-A, Lasco.A, Cardtrap.A, etc.), a number of model specific attacks has been reported (e.g., Nokia 6210 DoS, Siemens S55 SMS, etc.), and attacking mobile devices starts to interest the hacker community (e.g., Aware of the new security risks, the architects of Java ME-CLDC have proposed new security APIs [110] and adopted a real security-in-mind design of all new introduced APIs. However, the considerable efforts of securing Java ME-CLDC are constrained by strict memory and battery power limitations. Indeed, the expansion of battery capacity during the last years was modest and the expansion of mobile devices memory size, although considerable, was outpaced by the growing memory needs for system software and media capabilities. In fact, the development team of the latest Java ME- CLDC virtual machine [91] revealed that (1) Moore s Law does not apply to cell phone battery life, which means that so far, no exponential expansion of battery capacity with the passage of years has been observed and (2) Most of the available memory in a current-generation or next-generation handset is needed for system software and media capabilities. From what precedes, the market of Java-enabled phone is facing a delicate situation: On one hand, Java ME-CLDC is providing more capabilities and services to larger mobile users community, thus attracting more malevolent actors to join the existing mobile phone hackers community by providing them more possibilities and entry points to experiment new attacks. On the other hand, the efforts spent to reinforce the platform security are constrained by strict memory limitations. Accordingly, the following questions have to be asked and need to be precisely answered: (1) What are the security policies actually enforced on Java-enabled devices and how they are enforced? (2) What are the security vulnerabilities of the existing Java ME-CLDC implementations? (3) What are the risks involved by these platform vulnerabilities? (4) How can the security of this platform be improved? Answering these questions requires performing a security analysis of Java ME-CLDC. To our knowledge, there is no published work on the security analysis of Java ME-CLDC. The aforementioned questions can be generalized to the following main question: What are the limits of what can be enforced on a memory-constrained platform? Answering this general question represents a logical continuation of the efforts of some pioneer authors contributing to the emergence of a new research field. This nascent research field targets characterizing security enforcement mechanisms and identifying the classes of enforceable security policies. Particular attention has to be given to

17 Chapter 1. Introduction 3 execution monitoring (EM), a ubiquitous technique for enforcing security policies. In fact, this class of enforcement mechanisms has attracted the attention of the majority of researchers studying formal characterization of security policies and enforcement mechanisms. All these facts motivated us to elaborate a research thesis about memory-constrained security enforcement. More precisely, we investigate the security enforcement on Javaenabled memory-constrained devices by analyzing the security of Java ME-CLDC. An other important problem targeted by this thesis is the characterization of memoryconstrained security enforcement. More precisely, we investigate memory-constrained execution monitoring enforcement. 1.2 Objectives The main objective of this thesis is to evaluate and improve the security of memoryconstrained systems. Our investigation concerns two research areas. The first area is concerned with the evaluation and the improvement of memory-limited systems security. The second area is concerned with the characterization of memory-constrained security enforcement and the identification of its limitations. For the first area, we target the security of Java ME-CLDC, the standard Java platform for memory-limited networkconnected devices. For the second area, we target the characterization of memoryconstrained EM enforcement. More precisely, our objectives are the following: Study and evaluate the security of Java ME-CLDC. The output of this security analysis must (1) provide a comprehensive study of the Java ME-CLDC security model, (2) perform a vulnerability analysis of the platform, and (3) conduct a risk analysis. The security analysis must be as complete as possible by investigating standard specification documents, standard reference implementations, development platforms, and actual phones. Also, the analysis must be based on standard security evaluation and risk analysis methods. The performed analysis should point out possible shortcomings and aspects open for improvement. Provide a formal framework to characterize memory-constrained EM enforcement. The framework must allow (1) specifying the security policies that can be enforced by execution monitors constrained by memory imitations, (2) identifying the enforcement limits of memory-constrained EM by providing memory-size-directed taxonomy of EM-enforceable security policies, and (3) providing methodologies

18 Chapter 1. Introduction 4 and/or tools for deciding whether a security policy is enforceable by memoryconstrained EMs. The targeted results should be related as much as possible to language theory. 1.3 Methodology The methodology we adopt to reach the aforementioned objectives is detailed in the sequel. To study and evaluate Java ME-CLDC security, we first conduct a comprehensive study of Java ME-CLDC and the underlying security model, then we perform a security evaluation of this Java platform. The security evaluation consists of two main tasks: a vulnerability analysis and a risk analysis. Then, to characterize memory-constrained EM enforcement, we first study the state of the art related to characterizing enforceable security policies, then we provide our own contribution Studying Java ME-CLDC and its Security The study of Java ME-CLDC and its security was performed mainly by investigating the standard specifications and the available reference implementations. The standard specifications are mainly the Java Specification Requests (JSRs) adopted by the Java Community Process (JCP) for Java ME-CLDC APIs and the available documentation concerning the Java Virtual Machine (JVM). The reference implementations are the APIs implementations and the development platforms provided by Sun Microsystems. The study of Java ME-CLDC is performed by clarifying the differences between this Java platform and the conventional Java architecture (Java SE). The main investigated parts are the JVM, the mandatory APIs, and the optional APIs. The study starts by recalling the conventional Java security model. The main aspects covered by the study are static analysis (bytecode verification), sandbox model, security policy, and security policy enforcement Security Evaluation of Java ME-CLDC The components concerned by our evaluation are the JVM and the APIs recommended as mandatory in the latest revision of the Java Technology for the Wireless Industry

19 Chapter 1. Introduction 5 (JTWI) JSR [117]. The previous phase represents the starting point of the security evaluation of Java ME-CLDC. Our evaluation is performed following three main steps. First, we identify the Java ME-CLDC security model limitations. Then we perform a vulnerability analysis of the platform. Finally, we perform a risk analysis of Java ME- CLDC by estimating the seriousness of the uncovered vulnerabilities. The identified Java ME-CLDC security model limitations are the result of (1) our understanding of this security model, on the basis of the existing specification documents, and (2) a comparison with the conventional Java security model. The vulnerability analysis starts by compiling the known Java ME-CLDC vulnerabilities. Then we perform a static code analysis and a security testing of the investigated reference implementations. To be as efficient as possible in accomplishing these two tasks, we perform a reverse engineering of the investigated reference implementations. While static analysis is limited to the available reference implementations, security testing is performed on reference implementations, development platforms and actual phones. Static analysis is performed by manual code inspection and automatic tools. Security testing is performed by executing test suites implementing attack scenarios. Each attack scenario is designed to test some functional component of Java ME-CLDC. Risk analysis aims at structuring the uncovered vulnerabilities and assess the underlying risks according to a well-established and standard framework. The MEHARI method [30] is used to achieve this objective. The MEHARI s criteria are used to structure the uncovered vulnerabilities into an appropriate classification. Afterwards, the seriousness of each vulnerability is assessed based on the MEHARI s risk analysis methodology guidelines. As a downstream result of this phase, a reasonable and efficient set of security requirements is elaborated to harden the security of Java ME-CLDC platform implementations Characterizing Memory-constrained EM Enforcement To provide a formal characterization of memory-constrained EM-enforcement, we started by studying the state of the art related to characterizing security enforcement and classifying enforceable security policies. In particular, we investigated those contributions targeting constrained EM enforcement. EM mechanisms can be classified into conventional EMs and rewriting-based EMs. EMs belonging to the former class are usually specified by security automata [123] while those belonging to latter are commonly specified by edit automata [11]. To cover both conventional and rewriting-based EMs, our characterization is built on

20 Chapter 1. Introduction 6 top of both security automata and edit automata. To characterize memory-constraints, we instantiated and extended Fong s abstraction approach to deal with memory-limitations. The adopted abstraction characterizes the information tracked by an execution monitor by a bounded history representing the memory space which contains the history information tracked by the monitor. The abstraction definition is extended so (1) it covers finite and infinite executions and (2) it applies to both CEM-enforceable properties and RWEM-enforceable properties. Our characterization allows the specification of those security policies that can be enforced by memory-constrained EMs. The specification is based on a class of automata that we call bounded history automata. Also, we identified a new taxonomy of EM-enforceable properties. This taxonomy is directed by the size of the space used by execution monitors to save execution history. To provide methodologies and tools for deciding whether a given security policy is enforceable by memory-constrained EMs, we investigated the specification of locally testable properties by bounded history automata. Namely, we identified BHAenforceable local properties and showed how to check whether an EM-enforceable policy is local or not. The latter is performed by selecting automata-based algorithms which decide wether an EM-enforceable property is local or not. 1.4 Contributions Our contribution is mainly threefold: 1. We carefully studied and evaluated Java ME-CLDC security. To this end, we investigated both published specifications and available implementations. From the specifications, we completed a comprehensive study of Java ME-CLDC security, pointing out possible shortcomings and suggestions for improvements. Concerning the implementations, we extracted details of the security architecture (that are not well explained in the specification) and by black box testing and code inspection, we analyzed the security vulnerabilities of the platform. We performed our vulnerability analysis on reference implementations, development platforms, phone emulators, and actual phones. A useful result of the vulnerability analysis is a test suite that can be used to evaluate any Java ME-CLDC implementation. Finally, we performed a risk analysis of Java ME-CLDC. The analysis was performed using the MEHARI [30] method and it provides a seriousness estimation of the uncovered vulnerabilities. 2. We provided a characterization of memory-constrained EM enforcement. Namely,

Java Platform, Micro Edition (Java ME) Mokoena F.R. The 7046 Team

Java Platform, Micro Edition (Java ME) Mokoena F.R. The 7046 Team Java Platform, Micro Edition (Java ME) Mokoena F.R The 7046 Team 1. Introduction Java Platform, Micro Edition (Java ME) technology is one of the popular mobile application runtime. It provides developers

More information

Security Evaluation of J2ME CLDC Embedded Java Platform

Security Evaluation of J2ME CLDC Embedded Java Platform Vol. 5, No. 2, March April 2006 Security Evaluation of J2ME CLDC Embedded Java Platform Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi and Sami Zhioua Computer Security Laboratory Concordia Institute

More information

Mobile application development J2ME U N I T I I

Mobile application development J2ME U N I T I I Mobile application development J2ME U N I T I I Overview J2Me Layered Architecture Small Computing Device requirements Run Time Environment Java Application Descriptor File Java Archive File MIDlet Programming

More information

MIDlet development with J2ME and MIDP

MIDlet development with J2ME and MIDP MIDlet development with J2ME and MIDP ibm.com/developerworks Table of Contents If you're viewing this document online, you can click any of the topics below to link directly to that section. 1. Introduction...

More information

Development of Java ME

Development of Java ME Y39PDA Development of Java ME application České vysoké učení technické v Praze Fakulta Elektrotechnická Content What is Java ME Low Level a High Level API What is JSR LBS Java ME app. life-cycle 2/29 Is

More information

Mobile Application Development

Mobile Application Development Mobile Application Development Development Process and Portability Christoph Denzler University of Applied Sciences Northwestern Switzerland Institute for Mobile and Distributed Systems Learning Target

More information

Mobile Software Application Development. Tutorial. Caesar Ogole. April 2006

Mobile Software Application Development. Tutorial. Caesar Ogole. April 2006 Mobile Software Application Development Tutorial By Caesar Ogole April 2006 About the Tutorial: In this tutorial, you will learn how to build a cross-platform mobile software application that runs on the

More information

Java ME & NetBeans Mobility. Petr Suchomel Architect, NetBeans Mobility Sun Microsystems

Java ME & NetBeans Mobility. Petr Suchomel Architect, NetBeans Mobility Sun Microsystems Java ME & NetBeans Mobility Petr Suchomel Architect, NetBeans Mobility Sun Microsystems Agenda Java ME introduction Java ME applications NetBeans Mobility Edition Power of advanced features Demos, demos,

More information

Tutorial: Development of Interactive Applications for Mobile Devices

Tutorial: Development of Interactive Applications for Mobile Devices Tutorial: Development of Interactive Applications for Mobile Devices 7th International Conference on Human Computer Interaction with Mobile Devices and Services (Mobile HCI 2005) (Media Informatics Group,

More information

The Java Virtual Machine and Mobile Devices. John Buford, Ph.D. buford@alum.mit.edu Oct 2003 Presented to Gordon College CS 311

The Java Virtual Machine and Mobile Devices. John Buford, Ph.D. buford@alum.mit.edu Oct 2003 Presented to Gordon College CS 311 The Java Virtual Machine and Mobile Devices John Buford, Ph.D. buford@alum.mit.edu Oct 2003 Presented to Gordon College CS 311 Objectives Review virtual machine concept Introduce stack machine architecture

More information

Armed E-Bunny: A Selective Dynamic Compiler for Embedded Java Virtual Machine Targeting ARM Processors

Armed E-Bunny: A Selective Dynamic Compiler for Embedded Java Virtual Machine Targeting ARM Processors 2005 ACM Symposium on Applied Computing Armed E-Bunny: A Selective Dynamic Compiler for Embedded Java Virtual Machine Targeting ARM Processors Mourad Debbabi Computer Security Research Group CIISE, Concordia

More information

Mobile Operating Systems. Week I

Mobile Operating Systems. Week I Mobile Operating Systems Week I Overview Introduction Mobile Operating System Structure Mobile Operating System Platforms Java ME Platform Palm OS Symbian OS Linux OS Windows Mobile OS BlackBerry OS iphone

More information

ALTERNATIVE JAVA SECURITY POLICY MODEL

ALTERNATIVE JAVA SECURITY POLICY MODEL FRÉDÉRIC SAMSON ALTERNATIVE JAVA SECURITY POLICY MODEL Mémoire présenté à la Faculté des études supérieures de l Université Laval dans le cadre du programme de maîtrise en informatique pour l obtention

More information

DESIGNING SHIFT CALENDAR FOR MOBILE PHONE

DESIGNING SHIFT CALENDAR FOR MOBILE PHONE Bachelor's thesis Degree program Information technology 2010 Maamar zeddek DESIGNING SHIFT CALENDAR FOR MOBILE PHONE BACHELOR S THESIS ABSTRACT TURKU UNIVERSITY OF APPLIED SCIENCES Degree programme Infomation

More information

Introduction to SunOne Development Tools by Mr. Mickey Fan, Java Architect, Sun Microsystems. Good morning. Ladies and Gentlemen.

Introduction to SunOne Development Tools by Mr. Mickey Fan, Java Architect, Sun Microsystems. Good morning. Ladies and Gentlemen. Introduction to SunOne Development Tools by Mr. Mickey Fan, Java Architect, Sun Microsystems Good morning. Ladies and Gentlemen. the mobile edition. I am glad to be invited to be here. Today my topic is

More information

Java ME Clients for XML Web Services

Java ME Clients for XML Web Services 66 Java ME Clients for XML Web Services Paul POCATILU Academy of Economic Studies, Bucharest Using Web services in developing applications has many advantages like the existence of standards, multiple

More information

A Runtime Monitoring Environment for Mobile Java

A Runtime Monitoring Environment for Mobile Java A Runtime Monitoring Environment for Mobile Java Fabio Martinelli Istituto di Informatica e Telematica Consiglio Nazionale delle Ricerche Pisa, Italy fabio.martinelli@iit.cnr.it Thomas Quillinan Vrije

More information

Technical Note. Micron Flash Data Integrator (FDI) Support for Java Applications. Introduction. Definition

Technical Note. Micron Flash Data Integrator (FDI) Support for Java Applications. Introduction. Definition Technical Note TN-13-09: FDI Support for Java Applications Introduction Micron Flash Data Integrator (FDI) Support for Java Applications Introduction This document provides an instructional reference to

More information

Sun Management Center Change Manager 1.0.1 Release Notes

Sun Management Center Change Manager 1.0.1 Release Notes Sun Management Center Change Manager 1.0.1 Release Notes Sun Microsystems, Inc. 4150 Network Circle Santa Clara, CA 95054 U.S.A. Part No: 817 0891 10 May 2003 Copyright 2003 Sun Microsystems, Inc. 4150

More information

Audit de sécurité avec Backtrack 5

Audit de sécurité avec Backtrack 5 Audit de sécurité avec Backtrack 5 DUMITRESCU Andrei EL RAOUSTI Habib Université de Versailles Saint-Quentin-En-Yvelines 24-05-2012 UVSQ - Audit de sécurité avec Backtrack 5 DUMITRESCU Andrei EL RAOUSTI

More information

Fachbereich Informatik und Elektrotechnik SunSPOT. Ubiquitous Computing. Ubiquitous Computing, Helmut Dispert

Fachbereich Informatik und Elektrotechnik SunSPOT. Ubiquitous Computing. Ubiquitous Computing, Helmut Dispert Ubiquitous Computing Ubiquitous Computing The Sensor Network System Sun SPOT: The Sun Small Programmable Object Technology Technology-Based Wireless Sensor Networks a Java Platform for Developing Applications

More information

What Perl Programmers Should Know About Java

What Perl Programmers Should Know About Java Beth Linker, blinker@panix.com Abstract The Java platform is by no means a replacement for Perl, but it can be a useful complement. Even if you do not need to or want to use Java, you should know a bit

More information

A Selective Dynamic Compiler for Embedded Java Virtual Machine Targeting ARM Processors

A Selective Dynamic Compiler for Embedded Java Virtual Machine Targeting ARM Processors AZZAM MOURAD A Selective Dynamic Compiler for Embedded Java Virtual Machine Targeting ARM Processors Mémoire présenté à la Faculté des études supérieures de l Université Laval dans le cadre du programme

More information

N1 Grid Service Provisioning System 5.0 User s Guide for the Linux Plug-In

N1 Grid Service Provisioning System 5.0 User s Guide for the Linux Plug-In N1 Grid Service Provisioning System 5.0 User s Guide for the Linux Plug-In Sun Microsystems, Inc. 4150 Network Circle Santa Clara, CA 95054 U.S.A. Part No: 819 0735 December 2004 Copyright 2004 Sun Microsystems,

More information

Sun StorEdge A5000 Installation Guide

Sun StorEdge A5000 Installation Guide Sun StorEdge A5000 Installation Guide for Windows NT Server 4.0 Sun Microsystems, Inc. 901 San Antonio Road Palo Alto, CA 94303-4900 USA 650 960-1300 Fax 650 969-9131 Part No. 805-7273-11 October 1998,

More information

Sun Management Center 3.6 Version 5 Add-On Software Release Notes

Sun Management Center 3.6 Version 5 Add-On Software Release Notes Sun Management Center 3.6 Version 5 Add-On Software Release Notes For Sun Fire, Sun Blade, Netra, and Sun Ultra Systems Sun Microsystems, Inc. www.sun.com Part No. 819-7977-10 October 2006, Revision A

More information

Mobile-PC Suite: Using Mobile Phone as Remote to Control PC Operations

Mobile-PC Suite: Using Mobile Phone as Remote to Control PC Operations Mobile-PC Suite: Using Mobile Phone as Remote to Control PC Operations R.S.S.Vishnu Priya, P.Panini Sai, K.Ruth Ramya, N.Chandra Sekhar, K.Venkata Prasad, P.D.Nageswara Rao Dept. of CSE, KLCE Vaddeswaram,

More information

Mobile Development Discovery Document

Mobile Development Discovery Document Mobile Development Discovery Document Prepared By: Abdul Wadood, Atifa Nadeem, Naima Khan and Haris Khan All Rights Reserved No part of this publication may be reproduced, reformatted or transmitted in

More information

Introduction to Mobile Phone. Programming in Java Me

Introduction to Mobile Phone. Programming in Java Me Introduction to Mobile Phone Programming in Java Me (prepared for CS/ECE 707, UW-Madison) Author: Leszek Wiland and Suman Banerjee 1 Content 1. Introduction 2. Setting up programming environment 3. Hello

More information

Hardware/Software Co-Design of a Java Virtual Machine

Hardware/Software Co-Design of a Java Virtual Machine Hardware/Software Co-Design of a Java Virtual Machine Kenneth B. Kent University of Victoria Dept. of Computer Science Victoria, British Columbia, Canada ken@csc.uvic.ca Micaela Serra University of Victoria

More information

CSCI E 98: Managed Environments for the Execution of Programs

CSCI E 98: Managed Environments for the Execution of Programs CSCI E 98: Managed Environments for the Execution of Programs Draft Syllabus Instructor Phil McGachey, PhD Class Time: Mondays beginning Sept. 8, 5:30-7:30 pm Location: 1 Story Street, Room 304. Office

More information

Storing Encrypted Plain Text Files Using Google Android

Storing Encrypted Plain Text Files Using Google Android Storing Encrypted Plain Text Files Using Google Android Abstract Jared Hatfield University of Louisville Google Android is an open source operating system that is available on a wide variety of smart phones

More information

Archived Content. Contenu archivé

Archived Content. Contenu archivé ARCHIVED - Archiving Content ARCHIVÉE - Contenu archivé Archived Content Contenu archivé Information identified as archived is provided for reference, research or recordkeeping purposes. It is not subject

More information

ATP Co C pyr y ight 2013 B l B ue C o C at S y S s y tems I nc. All R i R ghts R e R serve v d. 1

ATP Co C pyr y ight 2013 B l B ue C o C at S y S s y tems I nc. All R i R ghts R e R serve v d. 1 ATP 1 LES QUESTIONS QUI DEMANDENT RÉPONSE Qui s est introduit dans notre réseau? Comment s y est-on pris? Quelles données ont été compromises? Est-ce terminé? Cela peut-il se reproduire? 2 ADVANCED THREAT

More information

Nokia 9210i/9290 Communicators and PersonalJava TM Application Development

Nokia 9210i/9290 Communicators and PersonalJava TM Application Development Nokia 9210i/9290 Communicators and Personal TM Application Development 05-03-2002 Nokia 9210i/9290 Communicators and PersonalTM Application Development Table of contents 1. DIFFERENT JAVA TECHNOLOGIES...

More information

Interfaces de programmation pour les composants de la solution LiveCycle ES (juillet 2008)

Interfaces de programmation pour les composants de la solution LiveCycle ES (juillet 2008) Interfaces de programmation pour les composants de la solution LiveCycle ES (juillet 2008) Ce document répertorie les interfaces de programmation que les développeurs peuvent utiliser pour créer des applications

More information

Restraining Execution Environments

Restraining Execution Environments Restraining Execution Environments Segurança em Sistemas Informáticos André Gonçalves Contents Overview Java Virtual Machine: Overview The Basic Parts Security Sandbox Mechanisms Sandbox Memory Native

More information

Durée 4 jours. Pré-requis

Durée 4 jours. Pré-requis F5 - BIG-IP Application Security Manager V11.0 Présentation du cours Ce cours traite des attaques applicatives orientées Web et de la façon d utiliser Application Security Manager (ASM) pour s en protéger.

More information

Developing Wireless GIS: Using Java and XML Technologies

Developing Wireless GIS: Using Java and XML Technologies Developing Wireless GIS: Using Java and XML Technologies Hossein Mohammadi GIS Dept., Faculty of Geodesy and Geomatics Eng. K.N. Toosi University of Technology Vali_Asr St., Mirdamad Cross, Tehran, Iran,

More information

2 Introduction to Java. Introduction to Programming 1 1

2 Introduction to Java. Introduction to Programming 1 1 2 Introduction to Java Introduction to Programming 1 1 Objectives At the end of the lesson, the student should be able to: Describe the features of Java technology such as the Java virtual machine, garbage

More information

Using mobile phones to access Web Services in a secure way. Dan Marinescu

Using mobile phones to access Web Services in a secure way. Dan Marinescu Using mobile phones to access Web Services in a secure way Dan Marinescu March 7, 2007 Abstract Web Services is a technology that has gained in acceptance and popularity over the past years. The promise

More information

Solaris 10 Documentation README

Solaris 10 Documentation README Solaris 10 Documentation README Sun Microsystems, Inc. 4150 Network Circle Santa Clara, CA 95054 U.S.A. Part No: 817 0550 10 January 2005 Copyright 2005 Sun Microsystems, Inc. 4150 Network Circle, Santa

More information

Review of J2ME and J2ME-based Mobile Applications

Review of J2ME and J2ME-based Mobile Applications IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.2, February 2008 189 Review of J2ME and J2ME-based Mobile Applications Anna Isakow and Hao Shi School of Computer Science

More information

Extreme Java G22.3033-006. Session 3 Main Theme Java Core Technologies (Part I) Dr. Jean-Claude Franchitti

Extreme Java G22.3033-006. Session 3 Main Theme Java Core Technologies (Part I) Dr. Jean-Claude Franchitti Extreme Java G22.3033-006 Session 3 Main Theme Java Core Technologies (Part I) Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences Agenda

More information

Topics. Introduction. Java History CS 146. Introduction to Programming and Algorithms Module 1. Module Objectives

Topics. Introduction. Java History CS 146. Introduction to Programming and Algorithms Module 1. Module Objectives Introduction to Programming and Algorithms Module 1 CS 146 Sam Houston State University Dr. Tim McGuire Module Objectives To understand: the necessity of programming, differences between hardware and software,

More information

How To Write A Program In Java (Programming) On A Microsoft Macbook Or Ipad (For Pc) Or Ipa (For Mac) (For Microsoft) (Programmer) (Or Mac) Or Macbook (For

How To Write A Program In Java (Programming) On A Microsoft Macbook Or Ipad (For Pc) Or Ipa (For Mac) (For Microsoft) (Programmer) (Or Mac) Or Macbook (For Projet Java Responsables: Ocan Sankur, Guillaume Scerri (LSV, ENS Cachan) Objectives - Apprendre à programmer en Java - Travailler à plusieurs sur un gros projet qui a plusieurs aspects: graphisme, interface

More information

JAVA WEB START OVERVIEW

JAVA WEB START OVERVIEW JAVA WEB START OVERVIEW White Paper May 2005 Sun Microsystems, Inc. Table of Contents Table of Contents 1 Introduction................................................................. 1 2 A Java Web Start

More information

Linux A multi-purpose executive support for civil avionics applications?

Linux A multi-purpose executive support for civil avionics applications? August 2004 Serge GOIFFON Pierre GAUFILLET AIRBUS France Linux A multi-purpose executive support for civil avionics applications? Civil avionics software context Main characteristics Required dependability

More information

The Hotspot Java Virtual Machine: Memory and Architecture

The Hotspot Java Virtual Machine: Memory and Architecture International Journal of Allied Practice, Research and Review Website: www.ijaprr.com (ISSN 2350-1294) The Hotspot Java Virtual Machine: Memory and Architecture Prof. Tejinder Singh Assistant Professor,

More information

Cloud Computing. Up until now

Cloud Computing. Up until now Cloud Computing Lecture 11 Virtualization 2011-2012 Up until now Introduction. Definition of Cloud Computing Grid Computing Content Distribution Networks Map Reduce Cycle-Sharing 1 Process Virtual Machines

More information

Java Technologies for Interactive Television

Java Technologies for Interactive Television Java Technologies for Interactive Television Technical White Paper Sun Microsystems, Inc. 901 San Antonio Road Palo Alto, CA 94303 1 (800) 786.7638 1.512.434.1511 Copyright 2001 Sun Microsystems, Inc.,

More information

Archived Content. Contenu archivé

Archived Content. Contenu archivé ARCHIVED - Archiving Content ARCHIVÉE - Contenu archivé Archived Content Contenu archivé Information identified as archived is provided for reference, research or recordkeeping purposes. It is not subject

More information

Wireless Java Programming for Enterprise Applications

Wireless Java Programming for Enterprise Applications Wireless Java Programming for Enterprise Applications Mobile Devices Go Corporate Dan Harkey Shan Appajodu Mike Urkin WILEY PUBLISHING, INC. Jl. ^E^.^l.^ Contents Foreword Preface v vii Part 1. Technologies

More information

Mobile Application Languages XML, Java, J2ME and JavaCard Lesson 04 Java

Mobile Application Languages XML, Java, J2ME and JavaCard Lesson 04 Java Mobile Application Languages XML, Java, J2ME and JavaCard Lesson 04 Java Oxford University Press 2007. All rights reserved. 1 C and C++ C and C++ with in-line-assembly, Visual Basic, and Visual C++ the

More information

Building Applications Using Micro Focus COBOL

Building Applications Using Micro Focus COBOL Building Applications Using Micro Focus COBOL Abstract If you look through the Micro Focus COBOL documentation, you will see many different executable file types referenced: int, gnt, exe, dll and others.

More information

System Requirements Orion

System Requirements Orion Orion Date 21/12/12 Version 1.0 Référence 001 Auteur Antoine Crué VOS CONTACTS TECHNIQUES JEAN-PHILIPPE SENCKEISEN ANTOINE CRUE LIGNE DIRECTE : 01 34 93 35 33 EMAIL : JPSENCKEISEN@ORSENNA.FR LIGNE DIRECTE

More information

Office of the Auditor General / Bureau du vérificateur général FOLLOW-UP TO THE 2010 AUDIT OF COMPRESSED WORK WEEK AGREEMENTS 2012 SUIVI DE LA

Office of the Auditor General / Bureau du vérificateur général FOLLOW-UP TO THE 2010 AUDIT OF COMPRESSED WORK WEEK AGREEMENTS 2012 SUIVI DE LA Office of the Auditor General / Bureau du vérificateur général FOLLOW-UP TO THE 2010 AUDIT OF COMPRESSED WORK WEEK AGREEMENTS 2012 SUIVI DE LA VÉRIFICATION DES ENTENTES DE SEMAINE DE TRAVAIL COMPRIMÉE

More information

Toolkit in OPen-source for Critical Applications & SystEms Development

Toolkit in OPen-source for Critical Applications & SystEms Development Toolkit in OPen-source for Critical Applications & SystEms Development Patrick Farail AIRBUS France patrick.farail@airbus.com June 05 - IRISATECH 1 A limited market - Long life Products Uncertain suppliers

More information

Introduction au BIM. ESEB 38170 Seyssinet-Pariset Economie de la construction email : contact@eseb.fr

Introduction au BIM. ESEB 38170 Seyssinet-Pariset Economie de la construction email : contact@eseb.fr Quel est l objectif? 1 La France n est pas le seul pays impliqué 2 Une démarche obligatoire 3 Une organisation plus efficace 4 Le contexte 5 Risque d erreur INTERVENANTS : - Architecte - Économiste - Contrôleur

More information

Archived Content. Contenu archivé

Archived Content. Contenu archivé ARCHIVED - Archiving Content ARCHIVÉE - Contenu archivé Archived Content Contenu archivé Information identified as archived is provided for reference, research or recordkeeping purposes. It is not subject

More information

MIDP 3.0 overview. Copyright 2008 Aplix Corporation. All rights reserved.

MIDP 3.0 overview. Copyright 2008 Aplix Corporation. All rights reserved. MIDP 3.0 overview MIDP 3.0 specification status 2 New MIDP 3.0 functionality 3 CLDC 1.1.1 4 Mandatory JSR 135 v1.1 compliance 5 Concurrency 6 Events 7 Events MIDlet-Event-Launch- :;;

More information

Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices

Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices Iulia Ion, Boris Dragovic Create-Net, Trento, Italy. firstname.lastname@create-net.org Bruno Crispo University

More information

Programming Languages

Programming Languages Programming Languages In the beginning To use a computer, you needed to know how to program it. Today People no longer need to know how to program in order to use the computer. To see how this was accomplished,

More information

Characteristics of Java (Optional) Y. Daniel Liang Supplement for Introduction to Java Programming

Characteristics of Java (Optional) Y. Daniel Liang Supplement for Introduction to Java Programming Characteristics of Java (Optional) Y. Daniel Liang Supplement for Introduction to Java Programming Java has become enormously popular. Java s rapid rise and wide acceptance can be traced to its design

More information

Jonathan Worthington Scarborough Linux User Group

Jonathan Worthington Scarborough Linux User Group Jonathan Worthington Scarborough Linux User Group Introduction What does a Virtual Machine do? Hides away the details of the hardware platform and operating system. Defines a common set of instructions.

More information

Sandy. The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis. Garage4Hackers

Sandy. The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis. Garage4Hackers Sandy The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis About Me! I work as a Researcher for a Global Threat Research firm.! Spoke at the few security

More information

Write. Once. Deploy. Anywhere. Anatole Wilson. Writing Applications for mobile devices and reducing device fragmentation with NetBeans Mobility Pack

Write. Once. Deploy. Anywhere. Anatole Wilson. Writing Applications for mobile devices and reducing device fragmentation with NetBeans Mobility Pack Write Once Deploy nywhere Writing pplications for mobile devices and reducing device fragmentation with NetBeans Mobility Pack natole Wilson Write Once, Deploy nywhere Take a look around you in just about

More information

Sun TM SNMP Management Agent Release Notes, Version 1.6

Sun TM SNMP Management Agent Release Notes, Version 1.6 Sun TM SNMP Management Agent Release Notes, Version 1.6 Sun Microsystems, Inc. www.sun.com Part No. 820-5966-12 December 2008, Revision A Submit comments about this document by clicking the Feedback[+]

More information

Java Dynamic Management Architecture for Intelligent Networks

Java Dynamic Management Architecture for Intelligent Networks Java Dynamic Management Architecture for Intelligent Networks Sun Microsystems, Inc. 901 San Antonio Road Palo Alto, CA 94303 1 (800) 786.7638 +1.512.434.1511 Copyright 1998 Sun Microsystems, Inc., 901

More information

C Compiler Targeting the Java Virtual Machine

C Compiler Targeting the Java Virtual Machine C Compiler Targeting the Java Virtual Machine Jack Pien Senior Honors Thesis (Advisor: Javed A. Aslam) Dartmouth College Computer Science Technical Report PCS-TR98-334 May 30, 1998 Abstract One of the

More information

Java and Java Virtual Machine Security

Java and Java Virtual Machine Security Java and Java Virtual Machine Security Vulnerabilities and their Exploitation Techniques by Last Stage of Delirium Research Group http://lsd-pl.net Version: 1.0.0 Updated: October 2nd, 2002 Copyright c

More information

B M C S O F T W A R E, I N C. BASIC BEST PRACTICES. Ross Cochran Principal SW Consultant

B M C S O F T W A R E, I N C. BASIC BEST PRACTICES. Ross Cochran Principal SW Consultant B M C S O F T W A R E, I N C. PATROL FOR WEBSPHERE APPLICATION SERVER BASIC BEST PRACTICES Ross Cochran Principal SW Consultant PAT R O L F O R W E B S P H E R E A P P L I C AT I O N S E R V E R BEST PRACTICES

More information

1. Overview of the Java Language

1. Overview of the Java Language 1. Overview of the Java Language What Is the Java Technology? Java technology is: A programming language A development environment An application environment A deployment environment It is similar in syntax

More information

Archived Content. Contenu archivé

Archived Content. Contenu archivé ARCHIVED - Archiving Content ARCHIVÉE - Contenu archivé Archived Content Contenu archivé Information identified as archived is provided for reference, research or recordkeeping purposes. It is not subject

More information

Glassfish, JAVA EE, Servlets, JSP, EJB

Glassfish, JAVA EE, Servlets, JSP, EJB Glassfish, JAVA EE, Servlets, JSP, EJB Java platform A Java platform comprises the JVM together with supporting class libraries. Java 2 Standard Edition (J2SE) (1999) provides core libraries for data structures,

More information

The Java Community Process (JCP SM): Building the Future of Wireless

The Java Community Process (JCP SM): Building the Future of Wireless The Java Community Process (JCP SM): Building the Future of Wireless Sun Microsystems, Inc.! Hurwitz Report The Java Community Process (JCP SM): Building the Future of Wireless Sun Microsystems, Inc. iii

More information

ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY

ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY Suhas Holla #1, Mahima M Katti #2 # Department of Information Science & Engg, R V College of Engineering Bangalore, India Abstract In the advancing

More information

An evaluation of the Java Card environment

An evaluation of the Java Card environment An evaluation of the Java Card environment Christophe Rippert, Daniel Hagimont Contact: Christophe Rippert, Sirac Laboratory INRIA Rhône-Alpes, 655 avenue de l Europe Montbonnot 38334 St Ismier Cedex,

More information

Sun Management Center 3.6 Version 4 Add-On Software Release Notes

Sun Management Center 3.6 Version 4 Add-On Software Release Notes Sun Management Center 3.6 Version 4 Add-On Software Release Notes For Sun Fire, Sun Blade, Netra, and Sun Ultra Systems Sun Microsystems, Inc. www.sun.com Part No. 819-4989-10 July 2006, Revision A Submit

More information

Survey on Conference Services provided by the United Nations Office at Geneva

Survey on Conference Services provided by the United Nations Office at Geneva Survey on Conference Services provided by the United Nations Office at Geneva Trade and Development Board, fifty-eighth session Geneva, 12-23 September 2011 Contents Survey contents Evaluation criteria

More information

Start Here. Installation and Documentation Reference. Sun StorEdgeTM 6120 Array

Start Here. Installation and Documentation Reference. Sun StorEdgeTM 6120 Array Start Here Installation and Documentation Reference Sun StorEdgeTM 6120 Array 1 Access the Online Documentation These documents and other related documents are available online at http://www.sun.com/documentation

More information

Solaris Bandwidth Manager

Solaris Bandwidth Manager Solaris Bandwidth Manager By Evert Hoogendoorn - Enterprise Engineering Sun BluePrints Online - June 1999 http://www.sun.com/blueprints Sun Microsystems, Inc. 901 San Antonio Road Palo Alto, CA 94303 USA

More information

Solaris 9 9/05 Installation Roadmap

Solaris 9 9/05 Installation Roadmap Solaris 9 9/05 Installation Roadmap This document is a guide to the DVD-ROM, CD-ROMs, and documents involved in installing the Solaris 9 9/05 software. Unless otherwise specified, this document refers

More information

Optimizing Solaris Resources Through Load Balancing

Optimizing Solaris Resources Through Load Balancing Optimizing Solaris Resources Through Load Balancing By Tom Bialaski - Enterprise Engineering Sun BluePrints Online - June 1999 http://www.sun.com/blueprints Sun Microsystems, Inc. 901 San Antonio Road

More information

Sun StorEdge RAID Manager 6.2.21 Release Notes

Sun StorEdge RAID Manager 6.2.21 Release Notes Sun StorEdge RAID Manager 6.2.21 Release Notes formicrosoftwindowsnt Sun Microsystems, Inc. 901 San Antonio Road Palo Alto, CA 94303-4900 USA 650 960-1300 Fax 650 969-9131 Part No. 805-6890-11 November

More information

Java Card 2.2 Off-Card Verifier

Java Card 2.2 Off-Card Verifier Java Card 2.2 Off-Card Verifier White Paper Sun Microsystems, Inc. 901 San Antonio Road Palo Alto, CA 94303 USA 650 960-1300 June, 2002 Copyright 2002 Sun Microsystems, Inc., 901 San Antonio Road, Palo

More information

Online Recruitment System 1. INTRODUCTION

Online Recruitment System 1. INTRODUCTION 1. INTRODUCTION This project Online Recruitment System is an online website in which jobseekers can register themselves online and apply for job and attend the exam. Online Recruitment System provides

More information

Note concernant votre accord de souscription au service «Trusted Certificate Service» (TCS)

Note concernant votre accord de souscription au service «Trusted Certificate Service» (TCS) Note concernant votre accord de souscription au service «Trusted Certificate Service» (TCS) Veuillez vérifier les éléments suivants avant de nous soumettre votre accord : 1. Vous avez bien lu et paraphé

More information

Sun StorEdge Availability Suite Software Point-in-Time Copy Software Maximizing Backup Performance

Sun StorEdge Availability Suite Software Point-in-Time Copy Software Maximizing Backup Performance Sun StorEdge Availability Suite Software Point-in-Time Copy Software Maximizing Backup Performance A Best Practice Sun Microsystems, Inc. 4150 Network Circle Santa Clara, CA 95054 U.S.A. 650-960-1300 Part

More information

INTRODUCTION TO JAVA PROGRAMMING LANGUAGE

INTRODUCTION TO JAVA PROGRAMMING LANGUAGE INTRODUCTION TO JAVA PROGRAMMING LANGUAGE Today Java programming language is one of the most popular programming language which is used in critical applications like stock market trading system on BSE,

More information

The Java Series. Java Essentials I What is Java? Basic Language Constructs. Java Essentials I. What is Java?. Basic Language Constructs Slide 1

The Java Series. Java Essentials I What is Java? Basic Language Constructs. Java Essentials I. What is Java?. Basic Language Constructs Slide 1 The Java Series Java Essentials I What is Java? Basic Language Constructs Slide 1 What is Java? A general purpose Object Oriented programming language. Created by Sun Microsystems. It s a general purpose

More information

Sun Cluster 2.2 7/00 Data Services Update: Apache Web Server

Sun Cluster 2.2 7/00 Data Services Update: Apache Web Server Sun Cluster 2.2 7/00 Data Services Update: Apache Web Server Sun Microsystems, Inc. 901 San Antonio Road Palo Alto, CA 94303-4900 U.S.A. 650-960-1300 Part No. 806-6121 July 2000, Revision A Copyright 2000

More information

Validating Java for Safety-Critical Applications

Validating Java for Safety-Critical Applications Validating Java for Safety-Critical Applications Jean-Marie Dautelle * Raytheon Company, Marlborough, MA, 01752 With the real-time extensions, Java can now be used for safety critical systems. It is therefore

More information

Group Projects M1 - Cubbyhole

Group Projects M1 - Cubbyhole SUPINFO Academic Dept. Project presentation Group Projects Version 1.0 Last update: 20/11/2013 Use: Students Author: Samuel CUELLA Conditions d utilisations : SUPINFO International University vous permet

More information

Archived Content. Contenu archivé

Archived Content. Contenu archivé ARCHIVED - Archiving Content ARCHIVÉE - Contenu archivé Archived Content Contenu archivé Information identified as archived is provided for reference, research or recordkeeping purposes. It is not subject

More information

Archived Content. Contenu archivé

Archived Content. Contenu archivé ARCHIVED - Archiving Content ARCHIVÉE - Contenu archivé Archived Content Contenu archivé Information identified as archived is provided for reference, research or recordkeeping purposes. It is not subject

More information

Java Card. Smartcards. Demos. . p.1/30

Java Card. Smartcards. Demos. . p.1/30 . p.1/30 Java Card Smartcards Java Card Demos Smart Cards. p.2/30 . p.3/30 Smartcards Credit-card size piece of plastic with embedded chip, for storing & processing data Standard applications bank cards

More information

Sun Enterprise Optional Power Sequencer Installation Guide

Sun Enterprise Optional Power Sequencer Installation Guide Sun Enterprise Optional Power Sequencer Installation Guide For the Sun Enterprise 6500/5500 System Cabinet and the Sun Enterprise 68-inch Expansion Cabinet Sun Microsystems, Inc. 901 San Antonio Road Palo

More information

Last Class: OS and Computer Architecture. Last Class: OS and Computer Architecture

Last Class: OS and Computer Architecture. Last Class: OS and Computer Architecture Last Class: OS and Computer Architecture System bus Network card CPU, memory, I/O devices, network card, system bus Lecture 3, page 1 Last Class: OS and Computer Architecture OS Service Protection Interrupts

More information

WIND RIVER SECURE ANDROID CAPABILITY

WIND RIVER SECURE ANDROID CAPABILITY WIND RIVER SECURE ANDROID CAPABILITY Cyber warfare has swiftly migrated from hacking into enterprise networks and the Internet to targeting, and being triggered from, mobile devices. With the recent explosion

More information