Pages - Alphabetical View

View: Recently Updated · Alphabetical · Tree
  1. Prev
  2. 1
  3. 2
  4. Next
Title Last Updated By Updated
Page: SEC00-J. Do not allow privileged blocks to leak sensitive information across a trust boundary Carol J. Lallier Jul 01, 2015
Page: SEC01-J. Do not allow tainted variables in privileged blocks Jon O'Donnell Aug 06, 2021
Page: SEC02-J. Do not base security checks on untrusted sources Michal Rozenau May 18, 2021
Page: SEC03-J. Do not load trusted classes after allowing untrusted code to load arbitrary classes Michal Rozenau May 18, 2021
Page: SEC04-J. Protect sensitive operations with security manager checks Michal Rozenau May 18, 2021
Page: SEC05-J. Do not use reflection to increase accessibility of classes, methods, or fields Winfried Gerlach Jan 25, 2022
Page: SEC06-J. Do not rely on the default automatic signature verification provided by URLClassLoader and java.util.jar Jon O'Donnell Aug 06, 2021
Page: SEC07-J. Call the superclass's getPermissions() method when writing a custom class loader Will Snavely Nov 16, 2017
Page: SEC08-J Trusted code must discard or clean any arguments provided by untrusted code Barbara White Mar 05, 2015
Page: SEC09-J Never leak the results of certain standard API methods from trusted code to untrusted code Barbara White Mar 05, 2015
Page: SEC10-J Never permit untrusted code to invoke any API that may (possibly transitively) invoke the reflection APIs Barbara White Mar 05, 2015
Page: SEC50-J. Avoid granting excess privileges Will Snavely Nov 16, 2017
Page: SEC51-J. Minimize privileged code Michal Rozenau Jan 10, 2023
Page: SEC52-J. Do not expose methods that use reduced-security checks to untrusted code Will Snavely Nov 16, 2017
Page: SEC53-J. Define custom security permissions for fine-grained security Will Snavely Nov 16, 2017
Page: SEC54-J. Create a secure sandbox using a security manager Will Snavely Nov 16, 2017
Page: SEC55-J. Ensure that security-sensitive methods are called with validated arguments Will Snavely Nov 16, 2017
Page: SEC56-J. Do not serialize direct handles to system resources Will Snavely Nov 16, 2017
Page: SEC57-J. Do not let untrusted code misuse privileges of callback methods Will Snavely Nov 16, 2017
Page: SEC58-J. Deserialization methods should not perform potentially dangerous operations Will Snavely Nov 16, 2017
Page: SECURE CODING GUIDELINES FOR JAVA SE, VERSION 5.0 Derek Leung Dec 03, 2018
Page: Security: Introduction Carol J. Lallier Oct 26, 2014
Home page: SEI CERT Oracle Coding Standard for Java Robert Schiela Jun 11, 2018
Page: SER00-J. Enable serialization compatibility during class evolution Jon O'Donnell Aug 06, 2021
Page: SER01-J. Do not deviate from the proper signatures of serialization methods Jon O'Donnell Aug 06, 2021
Page: SER02-J. Sign then seal objects before sending them outside a trust boundary Jon O'Donnell Aug 06, 2021
Page: SER03-J. Do not serialize unencrypted sensitive data Jon O'Donnell Aug 06, 2021
Page: SER04-J. Do not allow serialization and deserialization to bypass the security manager Michal Rozenau May 18, 2021
Page: SER05-J. Do not serialize instances of inner classes Alexandre GIGLEUX Dec 20, 2018
Page: SER06-J. Make defensive copies of private mutable components during deserialization Jon O'Donnell Aug 06, 2021
  1. Prev
  2. 1
  3. 2
  4. Next