Classification of Component Vulnerabilities in Java']Java Service Oriented Programming (SOP) Platforms

被引:0
作者
Parrend, Pierre [1 ]
Frenot, Stephane [1 ]
机构
[1] Inst Natl Sci Appl, INRIA Amazones, CITI, F-69621 Villeurbanne, France
来源
COMPONENT-BASED SOFTWARE ENGINEERING, PROCEEDINGS | 2008年 / 5282卷
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Java based systems have evolved from stand-alone applications to multi-component to Service Oriented Programming (SOP) platforms. Each step of this evolution makes a set of Java vulnerabilities directly exploitable by malicious code: access to classes in multicomponent platforms, and access to object in SOP, is granted to them with Often no control. This paper defines two taxonomies that characterize vulnerabilities in Java components: the vulnerability categories, and the goals of the attacks that are based on these vulnerabilities. The 'vulnerability category' taxonomy is based on three application types: stand-alone, class sharing, and SOP. Entries express the absence of proper security features at places they are required to build secure component-based systems. The 'goal' taxonomy is based on the distinction between undue access, which encompasses the traditional integrity and confidentiality security properties, and denial-of-service. It provides a matching between the vulnerability categories and their consequences. The exploitability of each vulnerability is validated through the development of a pair of malicious and vulnerable components. Experiments are conducted in the context of the OSGi Platform. Based on the Vulnerability taxonomies, recommendations for writing hardened component code are issued.
引用
收藏
页码:80 / +
页数:16
相关论文
共 18 条
  • [1] BIEBER G, 2001, INTRO SERVICE ORIENT
  • [2] COTRONEO D, 2006, 26 IEEE INT C DISTR
  • [3] Security Evaluation of J2ME CLDC Embedded Java']Java Platform
    Debbabi, Mourad
    Saleh, Mohamed
    Talhi, Chamseddine
    Zhioua, Sami
    [J]. JOURNAL OF OBJECT TECHNOLOGY, 2006, 5 (02): : 125 - 154
  • [4] DOLBEC J, 1995, CASCON 1995, P19
  • [5] GOVINDAVAJHALA S, 2003, S SEC PRIV
  • [6] Finding bugs is easy
    Hovemeyer, D
    Pugh, W
    [J]. ACM SIGPLAN NOTICES, 2004, 39 (12) : 92 - 106
  • [7] Krsul, 1998, THESIS PURDUE U
  • [8] Security for the rest of us. Java']Java insecurity: Accounting for subtleties that can compromise code
    Lai, Charlie
    [J]. IEEE SOFTWARE, 2008, 25 (01) : 13 - 19
  • [9] A TAXONOMY OF COMPUTER-PROGRAM SECURITY FLAWS
    LANDWEHR, CE
    BULL, AR
    MCDERMOTT, JP
    CHOI, WS
    [J]. ACM COMPUTING SURVEYS, 1994, 26 (03) : 211 - 254
  • [10] How to systematically classify computer security intrusions
    Lindqvist, U
    Jonsson, E
    [J]. 1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1997, : 154 - 163