computersecurityhandbook.com
Home  >  Fourth Edition  >  Chapter 10
Chapter 10 –  Mobile Code
     Robert Gezelter, CDP

Chapter Contents:

   10.1    Introduction
   10.1.1    Mobile Code from the World Wide Web
   10.1.2    Design and Implementation Errors
   10.2    Signed Code
   10.2.1    Authenticode
   10.2.2    Fundamental Limitations of Signed Code
   10.2.3    Specific Problems with the ActiveX Security Model
   10.2.3.1    Importing and Installing Controls
   10.2.3.2    Running Controls
   10.2.3.3    Scripting Concerns
   10.2.4    Case Studies
   10.2.4.1    Internet Exploder
   10.2.4.2    Chaos Computer Club Demonstration
   10.2.4.3    Certificates Obtained by Imposters
   10.3    Restricted Operating Environments
   10.3.1    Java
   10.4    Discussion
   10.4.1    Asymmetric, and Transitive or Derivative, Trust
   10.4.2    Multidimensional Threat
   10.4.3    Server Responsibilities
   10.5    Summary
   10.6    Notes
   10.7    References and For Further Reading

Chapters Cross Referenced:
  Chapter 17 –  Operating System Security
  Chapter 22 –  Protecting Web Sites
  Chapter 23 –  Public Key Infrastructures and Certificate Authorities
  Chapter 25 –  Software Development and Quality Assurance

Please report problems to the webmaster at: webmaster@removethis.rlgsc.com
copyright 2002-2006, Robert Gezelter, All Rights Reserved