<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>On the road to Bandol &#187; Java</title>
	<atom:link href="https://javacard.vetilles.com/tag/java/feed/" rel="self" type="application/rss+xml" />
	<link>https://javacard.vetilles.com</link>
	<description>A weblog on Java Card, security, and other things personal</description>
	<lastBuildDate>Mon, 18 Aug 2025 06:48:26 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.0.32</generator>
	<item>
		<title>Live from JavaOne: Technical General Session</title>
		<link>https://javacard.vetilles.com/2010/09/22/live-from-javaone-technical-general-session/</link>
		<comments>https://javacard.vetilles.com/2010/09/22/live-from-javaone-technical-general-session/#comments</comments>
		<pubDate>Wed, 22 Sep 2010 04:51:39 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Discussions]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Java]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=619</guid>
		<description><![CDATA[This general session concentrated major news about JDK (desktop?), Java EE, and Java for Mobile and Embedded. Mark Reinhold basically explained the roadmap for JDK releases, which will follow Plan B. This means that there will be a release in 2011 with the features that are ready, and another release in 2012 with the features [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>This general session concentrated major news about JDK (desktop?), Java EE, and Java for Mobile and Embedded. Mark Reinhold basically explained the roadmap for JDK releases, which will follow <a href="http://blogs.sun.com/mr/entry/plan_b" class="liexternal">Plan B</a>. This means that there will be a release in 2011 with the features that are ready, and another release in 2012 with the features that are still work in progress at that stage. I will not into details, refer to Mark Reinhold&#8217;s blog for a <a href="http://openjdk.java.net/projects/jdk7/features/" class="liexternal">list of features</a> of the upcoming JDK 7.</p>
<p>I will only say that the functional programming enthusiasts will have to wait, as <a href="http://openjdk.java.net/projects/lambda/" class="liexternal">Project Lambda</a>, which plans to introduce closures into Java, has been deferred to JDK 8.</p>
<p>Throughout his presentation, Mark Reinhold has been very careful to show that all the major research and development work is performed in an open manner, and that the JCP procedures will be followed before to include anything in the language. Oracle is trying to prove that it supports the language.</p>
<p>About Java EE, no big news, as version 6 is less than one year old, and products are still being developed by the platform vendors. Of course, like in all other talks, there has been a reference to a Web tier, with a Web profile, RESTful services, HTML5 and JSON support and other usual suspects. Talk about strong directions â€¦ At least, the message is consistent.</p>
<p>Newt came Greg Bollella, talking about mobile and embedded stuff. He basically started with a statement from Oracle:</p>
<blockquote><p>Oracle is committed to modernizing the Java ME platform</p></blockquote>
<p>OK, message received. In practice, we are looking at an upcoming Java ME.Next, which is not yet clearly specified, expect for a few principles:</p>
<ul>
<li>Updates across the board (Virtual Machine, API, framework)</li>
<li>Guaranteed backward compatibility</li>
<li>Optional packages remain present for flexibility</li>
<li>JCP principles will be followed</li>
</ul>
<p>The Web extensions for mobile applications that I outlined <a href="http://bit.ly/c9fUFr" class="liexternal">earlier</a> is also in the program. However, I got disappointed, as no formal roadmap was announced. Since they are at the prototype level right now, I am afraid that it is still going to take years to iron out the &#8220;details&#8221; and make it a final specification. Too bad, we would need that quite soon.</p>
<p>Then, Greg Bollella moved to his favorite topis: embedded systems. He defined embedded as covering a wide area of things that contain a processor, with software, and that are not considered as computers. With this definition, there are 1000 times more processors sold in that space than in the the workstation space. Yep, that&#8217;s a big market.</p>
<p>According to Greg Bollella, another trend is that all these embedded devices are producing operational data that is just not used, because there is no way to get this data anywhere. For instance, in a car, many parameters are recorded every few milliseconds, temporarily stored, and then discarded. Most likely, it could be used for something.</p>
<p>After building all the excitement, there was nothing real to announce. Of course, the new Java ME is going to cover these embedded systems, but we didn&#8217;t get anything resembling a feature set or a roadmap. Things are hard on the device space.</p>
<p>Bollella mentioned Project Verrazano, though. It is a tool that takes a JAR and a platform spec, and it generates a self-contained output JAR, with everything required, including the APIs, the VM, and whatever else is required.  We learnt that HelloWorld on Java 6 can be shrunk from 58Mb to 8Mb, a 80% reduction, but still rather big (apparently, this is due at least in part to the fact that native code is not filtered intelligently). Of course, this is intended as an analysis tool, in order to determine which parts of Java are used (or not used) in embedded application, and to derive from that a specific profile. I guess that an adaptation of this project to the Java Card 3.0 Classic platform would be very practical for the generation of static Java Card products. However, I haven&#8217;t found links to this project on the Web. Let&#8217;s wait and see what happens.</p>
<p>Overall, not a bad general session. Oracle made great efforts to display support for Java, but the announcements were not really groundbreaking. One positive note, though: it gives hope that there will still be a JavaOne or similar event next year.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2010/09/22/live-from-javaone-technical-general-session/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Almost live from JavaOne: Trends for Mobile Java</title>
		<link>https://javacard.vetilles.com/2010/09/21/almost-live-from-javaone-trends-for-mobile-java/</link>
		<comments>https://javacard.vetilles.com/2010/09/21/almost-live-from-javaone-trends-for-mobile-java/#comments</comments>
		<pubDate>Tue, 21 Sep 2010 05:17:12 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Java]]></category>
		<category><![CDATA[mobile]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=607</guid>
		<description><![CDATA[I attended three more sessions that I didn&#8217;t cover in specific posts today. One of them, by Terence Barr, about rich applications and services for the mobile masses; an advertising session from Blackberry about their developer offer, and of course, the opening keynote from Thomas Kurian (EVP from Oracle, in charge of Java?). These sessions [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>I attended three more sessions that I didn&#8217;t cover in specific posts today. One of them, by <a href="http://terrencebarr.wordpress.com/" class="liexternal">Terence Barr</a>, about rich applications and services for the mobile masses; an advertising session from Blackberry about their developer offer, and of course, the opening keynote from Thomas Kurian (EVP from Oracle, in charge of Java?).</p>
<p>These sessions have been very different, but their combination gives a very strong orientation to the direction where mobile Java is heading:</p>
<ul>
<li><em>Nice apps for everybody</em>. Java is available on low-end and feature phones, and these phones can enjoy nice applications, like smartphones, thanks to Java. The LightWeight User Interface Toolkit (LWUIT) is the future of Java, a library that can be ported across many devices (I have doubts, but I want to believe; something to check at the Java demos).</li>
<li><em>Tight integration with the Web</em>. Now, when talking about mobile apps, we need to mention HTML5, using Web Services (RESTful services, JSON, and more), and mention &#8220;tight integration&#8221;. All three speakers mentioned interesting things, in different ways.</li>
<li><em>New APIs to access hardware</em>. This one sounds stranger, since the availability of such APIs already is a good point for Java. However, the sheer number of JSRs is staggering, so modernizing all this makes sense. NFC was mentioned by Kurian, and payment APIs have been announced by both Blackberry (with details) and Oracle (no details).</li>
</ul>
<p>Finally, a few highlights from the presentations. Terence Barr&#8217;s show was nice, although he ran into network problems. He has shown an example called &#8220;Meet me for Dinner&#8221;, combining locatoin-based stuff, consulting many Web services, and even using a Twitter library for using OAuth. He also promised to publish the full example, so I will wait for that. Well, maybe that in the mean time I will look at the <a href="http://kenai.com/projects/twitterapime/pages/Home" class="liexternal">Twitter API ME</a>.</p>
<p>The keynote was the occasion to get a few numbers. The estimates are now 1.1 desktops with Java, 3 billion mobile phones, and 1.4 billion cards every year. Naturally, Thomas Kurian didn&#8217;t get the full power of Java Card yet, and simply mentioned a total of 1.4 billion cards (somehow, they all do that). We also learned from Intel that combining hardware and software improvements allowed them to make a 40 times performance increase over 5 years, which beats Moore&#8217;s law by a whopping factor 5. I guess that proper optimization can yield results.</p>
<p>On the mobile front, we have been announced a total revamping of the mobile platform in Project <em>Java Mobile.Next</em>, and I guess that we&#8217;ll have to wait for that. There are many more projects happening, including Coin, Lambda, and Jigsaw, but these are not really new (just Google the trio to find out).</p>
<p>OK, that wraps the day. More news tomorrow. I will also try to spend a little time looking at demos.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2010/09/21/almost-live-from-javaone-trends-for-mobile-java/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Adam Gowdiak strikes again</title>
		<link>https://javacard.vetilles.com/2008/08/25/adam-gowdiak-strikes-again/</link>
		<comments>https://javacard.vetilles.com/2008/08/25/adam-gowdiak-strikes-again/#comments</comments>
		<pubDate>Mon, 25 Aug 2008 20:04:19 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Gowdiak]]></category>
		<category><![CDATA[Java]]></category>
		<category><![CDATA[logical attack]]></category>
		<category><![CDATA[Nokia]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/2008/08/25/adam-gowdiak-strikes-again/</guid>
		<description><![CDATA[Adam Gowdiak made a name for himself in the J2ME community in 2004, by publishing at the Hack-In-The-Box conference a paper about a nice attack on a Nokia device, based on a flaw he found in the bytecode verifier used at the time. He is back in the news this summer, with an undisclosed hack [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Adam Gowdiak made a name for himself in the J2ME community in 2004, by publishing at the <a href="http://conference.hackinthebox.org/hitbsecconf2004/" class="liexternal">Hack-In-The-Box</a> conference a paper about a nice attack on a Nokia device, based on a flaw he found in the bytecode verifier used at the time. He is back in the news this summer, with an <a href="http://www.security-explorations.com/n2srp.htm" class="liexternal">undisclosed hack</a> that allows him to take control of Nokia phones of the S40 series, and to run applications with all possible privileges. Nokia <a href="http://www.theregister.co.uk/2008/08/21/series_40_security/" class="liexternal">has acknowledged</a> the problem, as well as Sun, who are preparing a fix.</p>
<p>I cannot tell you much more about this hack, because Gowdiak asks for 20,000â‚¬ to get detailed information. However, based on the little information available, my personal guess is that the main problem is situated somewhere in the application manager. There are several reasons for that:</p>
<ul>
<li>First, the virtual machine is starting to be quite robust (Gowdiak has actually participated to that effort), and there have been significant reviews of the latest bytecode verifier. So, I would not say that the basic Java security features are broken.</li>
<li>Then, the flaw appears to be in the management of permissions, allowing an untrusted application to run and/or be recognized as a manufacturer application (the most privileged kind of applications). This is typically part of the Application Manager.</li>
<li>Finally, Adam Gowdiak claims that his attack is likely to work on other devices based on Sun&#8217;s RI of Java ME. It therefore means that part of the exploitation is in the portable part, and also that part of the attack is in the device-specific part.</li>
</ul>
<p>There are many ways to achieve such a feast, depending on the kind of attack that one is ready to perform:</p>
<ul>
<li>The device&#8217;s security policy may be stored in a file. In that case, the security of Java relies on the security of the underlying file system.</li>
<li>Application descriptors have to be stored somewhere. If the application manager does not check their consistency regularly, they could be modified.</li>
<li>Application code is also stored somewhere. They are not supposed to be modified, but consistency checks are expensive.</li>
<li>There are usually plenty of debugging features in a platform, that could be activated and used maliciously.</li>
</ul>
<p>Exploitation of such vulnerabilities usually is surprisingly easy. One you have access to all privileges, it is quite easy to write applications that do bad things. The last thing that an attacker would need is a way to push applications without warning the user, and this could be feasible with manufacturer privileges (after all, it is practical for a manufacturer to do that). Once again, I can&#8217;t say if it is the case with this particular attack.</p>
<p>About Nokia, I am a bit sad that they get busted here, because they are among the good guys in terms of mobile security. I guess that this kind of publicity is the price to pay for being the world leader. The S40 platform is a bit like the Windows of mobile phones, and breaking it is more interesting than breaking any other phone platform. Also, the reaction from Nokia, as mentioned by the Register, &#8220;we do not currently believe these issues represent a significant risk to customers&#8217; devices&#8221;, is a bit surprising, especially if we consider the definition of the issue by the same Register, &#8220;a miscreant exploiting them could do whatever they like to a Series 40 phone just by knowing the phone number&#8221;.</p>
<p>Finally, a note about Adam Gowdiak&#8217;s job. He did very good work in finding these flaws, and he is in trouble getting paid for it. I hope that Nokia, Sun, and others have paid the fee he asks for (which is not that big), but this remains an issue.I don&#8217;t know how much time Adam Gowdiak has spent on preparing this attack, but I am not sure that such work would be feasible in a consultancy mode. I have been involved in many security evaluations, and you don&#8217;t go very far for 20,000â‚¬. A complete security review of the S40 platform would cost may times that, and it is not that easy to find experts of Adam&#8217;s caliber. Nevertheless, the good old consultancy scheme presents some advantages for manufacturers. For instance, we at Trusted Labs have found many vulnerabilities on devices ranging from smart cards to payment terminals and mobile phones (including Java ME), but you have not heard about them, and you won&#8217;t hear about them any time soon, because all our work is performed under strong non-disclosure agreements.</p>
<p>Adam Gowdiak has acted responsibly by not posting any details and/or exploit code publicly. I am sure that most S40 phone owners never update their platform, so any flaw identified on such a platform is likely to stay around for years on millions of devices. Nevertheless, it is only a question of time before some bad guy gets the details of this attack: either through Adam directly (20,000â‚¬ is not that much, and some bad guys are very good at social engineering, for instance for posing as a manufacturer); or through an accomplice at a manufacturer; or even by rebuilding the attack as more and more information gets leaked.</p>
<p>When that happens, it will be interesting to see if it triggers a wave of malicious Java applications and other attacks on S40 devices. Only time will tell.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2008/08/25/adam-gowdiak-strikes-again/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
