4. Object Structures, Aliasing, and Encapsulation
4. Object Structures, Aliasing, and Encapsulation
4. Object Structures, Aliasing, and Encapsulation
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
3. By-passing interfaces:Security breach in Java JDK 1.1.1:• Each Class-object stores array of signers• Only trusted signers get extended accessrights to the host system• Through leaking of the array of signers, amalicious applet can modify the list of signersto get extended rights• Again, access modifiers cannot prevent theproblem, because arrays are mutableprivate Identity[ ] signers;…public Identity[ ]getSigners( ) {}return signers;13.05.13© A. Poetzsch-Heffter, TU Kaiserslautern8