Skip to main content

Covert distributed computing using Java through Web Spoofing

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1438))

Included in the following conference series:

Abstract

We use the Web Spoofing attack reported by Cohen and also the Secure Internet Programming Group at Princeton University to give a new method of achieving covert distributed computing with Java. We show how Java applets that perform a distributed computation can be inserted into vulnerable Web pages. This has the added feature that users can rejoin a computation at some later date through bookmarks made while the pages previously viewed were spoofed. Few signs of anything unusual can be observed. Users need not knowingly revisit a particular Web page to be victims.

We also propose a simple countermeasure against such a spoofing attack, which would be useful to help users detect the presence of Web Spoofing. Finally, we introduce the idea of browser users, as clients of Web-based services provided by third parties, “paying” for these services by running a distributed computation applet for a short period of time.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. S. R. White. Covert Distributed Processing With Computer Viruses. In Advances in Cryptology — Crypto '89 Proceedings, pages 616–619, Springer-Verlag, 1990.

    Google Scholar 

  2. Sun Microsystems. The Javaℳ Language: An Overview. See http: //java.sun.com/docs/overviews/java/java-overview-1.html [URL valid at 9 Feb. 1998].

    Google Scholar 

  3. Frederick B. Cohen. Internet holes: 50 ways to attack your web systems. Network Security, December 1995. See also http://all.net/journal/netsec/9512.html [URL valid at 20 Apr. 1998]

    Google Scholar 

  4. Frederick B. Cohen. A Note on Distributed Coordinated Attacks. Computers & Security, 15:103–121, 1996.

    Article  Google Scholar 

  5. Edward W. Feiten, Drew Dean and Dan S. Wallach. Java Security: From HotJava to Netscape and Beyond. In IEEE Symposium on Security and Privacy, 1996. See also http://www.cs.princeton.edu/sip/pub/secure96.html [URL valid at 9 Feb. 1998]

    Google Scholar 

  6. Drew Dean, Edward W. Feiten, Dirk Balfanz and Dan S. Wallach. Web spoofing: An Internet Con Game. Technical report 540-96, Department of Computer Science, Princeton University, 1997. In 20th National Information Systems Security Conference (Baltimore, Maryland), October, 1997. See also http://www.cs.princeton.edu/sip/pub/spoofing.html [URL valid at 9 Feb. 1998]

    Google Scholar 

  7. Gary McGraw and Edward W. Feiten. Java Security: Hostile Applets, Holes, and Antidotes. John Wiley & Sons, Inc., 1997.

    Google Scholar 

  8. M. D. LaDue. Hostile Applets on the Horizon. See http://www.rstcorp.com/hostile-applets/HostileArticle.html [URL valid at 12 Feb. 1998].

    Google Scholar 

  9. RFC 1945 “Hypertext Transfer Protocol — HTTP/1.0”. See http://www.w3.org/Protocols/rfc1945/rfc1945 [URL valid at 9 Feb. 1998].

    Google Scholar 

  10. RFC 2068 “Hypertext Transfer Protocol — HTTP/1.1”. See http://www.w3.org/Protocols/rfc2068/rfc2068 [URL valid at 9 Feb. 1998].

    Google Scholar 

  11. Sun Microsystems White Paper. Java Remote Method Invocation — Distributed Computing For Java. See http://www.javasoft.com/marketing/collateral/javarmi.html [URL valid at 9 Feb. 1998].

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Colin Boyd Ed Dawson

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Horton, J., Seberry, J. (1998). Covert distributed computing using Java through Web Spoofing. In: Boyd, C., Dawson, E. (eds) Information Security and Privacy. ACISP 1998. Lecture Notes in Computer Science, vol 1438. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0053720

Download citation

  • DOI: https://doi.org/10.1007/BFb0053720

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64732-4

  • Online ISBN: 978-3-540-69101-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics