Chapter 7. Manipulating Java Security

 

“An expert is one who knows more and more about less and less until he knows absolutely everything about nothing.”

 
 --Murphy's Technology Laws

Java Security Overview

From the beginning Java was designed to be secure. Security includes language features such as array index range checks, bytecode verification, and controlled access to critical system resources such as files and user information. At the beginning the security model assumed that all locally installed classes should be granted access to system resources and that all bytecode downloaded via the network should be restricted from sensitive information and operations. ...

Get Covert Java™: Techniques for Decompiling, Patching, and Reverse Engineering now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.