The Native Java Programming Language has suffered a Continuing Series of Vulnerabilities during the Past Two or More Years that Threaten to Destabilize Our Internet Technology.
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
The native Java Programming Language whose importance to the internet cannot be over emphasised, has suffered series of vulnerabilities that threaten to destabilize the Internet Technology. Most of the vulnerabilities are introduced into the internet when the functionalities of a language are increased or when new version of a language is released but the discovery of these security holes and the provision of patches to these holes are usually done by either relevant professional organization such as OWASP and CVE or the inventor (s) of the language. This review tries to explain the concept of vulnerabilities, the native Java flaws and practical solutions to the vulnerabilities as proffered by relevant computer security organization(s).This will serve as a guide to software developers considering the devastating effects of the ignorance of secure coding methods.
Authors and Affiliations
Audu Jonathan Adoga
A Survey of the Internet of Things
Abstract: This paper studies the state-of-art of Internet of Things (IoT). By enabling new forms of communication between people and things, and between things themselves, IoT would add a new dimension to the world of in...
Displaying All Bangla Compound Letters & Alphabets By 32-Segment
Abstract: Different approaches have been proposed for representing Bangla and English alphabets and numerals by segment display. But there is no complete and accurate scheme has been done yet for Bangla compound...
Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersive Routes
In a Wireless Sensor Network (WSN), specifically data aggregation reduces the amount of communication and energy utilization. Newly, the research centre has proposed a strong aggregation framework call...
Mining Top-k Closed Sequential Patterns in Sequential Databases
In data mining community, sequential pattern mining has been studied extensively. Most studies require the specification of minimum support threshold to mine the sequential patterns. However, it is difficult &nbs...
Secure and Efficient Key Management Scheme in MANETs
Abstract: InMobile ad hoc networks (MANETs) security has become a primary requirements. Thecharacteristics capabilities of MANETsexposeboth challenges and opportunities in achieving key security goals,such as confidentia...