Software Security Models for Service-Oriented Programming (SOP) Platforms

简介:
面向服务编程 (SOP) 平台是通用执行环境,可强制执行适合应用程序的架构模型:软件组件通过定义良好的接口进行通信,从而简化应用程序的配置和演进。这些平台利用其网络环境来执行分布式功能任务,同时也增强其管理和演进能力。它们涉及众多环境,从应用服务器到嵌入式医疗保健和汽车系统。SOP 平台带来的更高灵活性使得在设计阶段甚至运行时都可以集成不同发行商提供的组件。
然而,这种趋势有一个严重的缺点。很少有工具可以评估最终系统的实际质量,也没有工具可以保证所选组件不会执行恶意操作。在电子商务系统或敏感嵌入式系统等应用程序中,攻击者的干预是无法排除的。
软件安全保障提供了开发安全应用程序的方法,但侧重于单片系统。其原则如下:应在生命周期中尽早识别和解决漏洞,以避免运行时滥用并降低修补成本。但是,这种方法不太适合组件应用程序:开发过程不受集成商控制。当集成在运行时执行时,无法通过人工干预来评估组件的质量。
因此,我们建议对一个原型 SOP 平台(OSGi 平台)进行安全性分析,并提供针对已确定需求量身定制的保护机制。OSGi 平台的安全性分析采用我们为安全性基准测试定义的专用方法 SPIP(入侵防御螺旋过程)。它支持对目标系统的漏洞和相关安全机制的保护能力进行评估。分析的输出是:Java/OSGi 平台的漏洞和 Java SOP 组件的漏洞。
开发了几种保护机制来防止利用已发现的漏洞。它们在平台本身和组件级别实现。强化 OSGi 是一组用于构建更强大的 OSGi 平台实现的建议。 CBAC(基于组件的访问控制)是一种访问控制机制,它在安装时验证组件是否只执行授权的调用。它旨在比 Java 安全管理器更灵活,以确保只安装符合策略的组件,并尽可能减少验证性能开销。WCA(弱组件分析)是一种根据类的展示来识别 SOP 组件中可利用漏洞的工具:共享对象(即 SOP 服务)、共享类和组件内部类不会受到同一类型漏洞的困扰。
我们的主张通过与专用于 OSGi 应用程序的安全 JVM(JnJVM)集成得到验证。事实证明,由此产生的环境具有非常令人鼓舞的安全基准测试结果。
英文简介:
Service-oriented programming (SOP) platforms are generic execution environments enforcing a proper architectural model for applications: software components communicate through well-defined interfaces, which eases the configuration and evolution of applications. These platforms take advantage of their networked environment to perform distributed functional tasks, but also to enhance their management and evolution capacity. They are involved in numerous contexts, from applications servers to embedded health-care and automotive sys- tems. The increased flexibility brought in by SOP platforms enables to integrate components provided by different issuers during the design phase and even at runtime.
This trend has nonetheless a serious drawback. Few tools exist to assess the actual quality of the resulting systems, and none is available to guarantee that the selected components do not perform malicious actions. In applications such as e-Business systems or sensitive embedded systems, the intervention of attackers can not be excluded.
Software Security Assurance provides methods for the development of secure applications, but focuses on monolithic systems. Its principle is the following one: vulnerabilities should be identified and solved as early as possible in the life-cycle to avoid runtime abuses and to reduce patching costs. However, this approach is not well-suited for component applications: the development process is not controlled by the integrator. When the integration is performed at runtime, no human intervention is possible to evaluate the quality of the components.
We therefore propose to perform a security analysis of one prototypical SOP platform, the OSGi platform, and to provide protection mechanisms tailored to the identified requirements. The security analysis of the OSGi platform is performed with a dedicated method we define for security benchmarking, SPIP , the Spiral Process for Intrusion Prevention. It supports the assessment of vulnerabilities of the target system and of the protective power of associated security mechanisms. The output of the analysis is: the vulnerabilities of the Java/OSGi platform, and the vulnerabilities of Java SOP components.
Several protections mechanisms are developed to prevent the exploitation of identified vul- nerabilities. They are implemented in the platform itself and at the component level. Hardened OSGi is a set of recommendations for building more robust implementations of the OSGi platform. CBAC, Component-based Access Control, is an access control mechanism that ver- ifies at install time that a component only performs calls it is authorized to. It intends to be more flexible than the Java security manager, to ensure that policy-compliant components only are installed and to reduce as much as possible the verification performance overhead. WCA, Weak Component Analysis, is a tool for identifying exploitable vulnerabilities in SOP components, according to the exposition of classes: shared objects, i.e. SOP services, shared classes, and component internal classes are not plagued by the same type of vulnerabilities.
Our propositions are validated through their integration with a secure JVM dedicated to OSGi applications, the JnJVM. The resulting environment proves to have very encouraging security benchmarking results.
- 书名
- Software Security Models for Service-Oriented Programming (SOP) Platforms
- 译名
- 面向服务编程 (SOP) 平台的软件安全模型
- 语言
- 英语
- 年份
- 2008
- 页数
- 220页
- 大小
- 3.34 MB
- 下载
Software Security Models for Service-Oriented Programming (SOP) Platforms.pdf
- 密码
- 65536
最后更新:2025-04-12 23:58:12