13.07.2015 Views

4. Object Structures, Aliasing, and Encapsulation

4. Object Structures, Aliasing, and Encapsulation

4. Object Structures, Aliasing, and Encapsulation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

3. By-passing interfaces:Security breach in Java JDK 1.1.1:• Each Class-object stores array of signers• Only trusted signers get extended accessrights to the host system• Through leaking of the array of signers, amalicious applet can modify the list of signersto get extended rights• Again, access modifiers cannot prevent theproblem, because arrays are mutableprivate Identity[ ] signers;…public Identity[ ]getSigners( ) {}return signers;13.05.13© A. Poetzsch-Heffter, TU Kaiserslautern8

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!