Why COTS Software Increases Security Risks

نویسنده

  • Gary McGraw
چکیده

Understanding the risks inherent in using COTS software is important because information systems to day are being built from ever greater amounts of reused and pre packaged code Security analysis of complex software systems has always been a serious challenge with many open research issues Unfortunately COTS software serves only to complicate matters Often code that is acquired from a vendor is delivered in exe cutable form with no source code making some tradi tional analyses impossible The upshot is that relying on today s COTS systems to ensure security is a risky proposition especially when such systems are meant to work over the Internet This short paper touches on the risks inherent some of today s more popular COTS systems including Operating Systems and Java Vir tual Machines COTS in Action or COTS Inaction Like the rest of the Department of Defense the United States Navy is mandated to use Commercial O The Shelf COTS technology in order to stan dardize and to save money The Navy s Smart Ship initiative which is currently being tested as a pilot study on the Aegis missile cruiser USS Yorktown is a prime example of the move to COTS A major part of the initiative is to migrate systems to the Microsoft Windows NT Operating System What recently hap pened to the Yorktown serves to underscore the nature of security risks inherent in COTS based systems In September the Yorktown was underway in maneuvers o the Virginia coast During the maneu vers the Yorktown su ered a serious systems failure caused by a divide by zero error in an NT application According to the RISKS digest Volume Issue the zero seems to have been an erroneous data item entered by a system user As a result of the error the ship was dead in the water for over two and a half hours This somewhat amusing anecdote would turn out to be a very serious and potentially deadly problem dur ing wartime Windows NT is known to have a number of failure modes any one of which could be leveraged into an Information Warfare weapon Nevertheless since NT is quickly becoming a de facto standard in industry the DoD is unlikely to abandon its e ort to adopt it Instead of becoming less likely problems such as those experienced on the Yorktown are a hint of things to come COTS Problems Percolate Up Despite the proliferation of NT Workstations in business critical and mission critical environments lit tle analysis of the software that comprises the NT plat form has been performed This implies that the ex tent to which NT has inherent security and robustness risks systems built with a COTS architecture that in clude NT inherit the same risks Operating Systems are not alone in this problem Any third party software included in a system has the same risk percolation property whether the soft ware is packaged at the component level or higher That means that COTS parts of electronic commerce systems now on the drawing board including Web browsers and Java Virtual Machines introduce sim ilar concerns Unfortunately if a vendor embeds COTS software in a product end users will not ab solve the vendor of blame for any system failures The real problem is this COTS often su er from dependability secu rity and safety problems What can we do to analyze COTS and measure them according to these properties This problem is exacerbated by the fact that COTS are usually delivered with no guarantees about their behavior in black box form It is hard enough to try to determine what a program will do given its source code Without the source code the problem becomes much harder

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Empirical Study on Off-the-Shelf Component Usage in Industrial Projects

Using OTS (Off-The-Shelf) components in software projects has become increasing popular in the IT industry. After project managers opt for OTS components, they can decide to use COTS (Commercial-Off-The-Shelf) components or OSS (Open Source Software) components instead of building these themselves. This paper describes an empirical study on why project decisionmakers use COTS components instead...

متن کامل

Interaction Partnering Criteria for COTS Components

Commercial-off-the-Shelf (COTS) software provides a choice of products to streamline enterprise applications. COTS software integration can introduce security vulnerabilities due to mismatches between security constraints coupled with inadequate knowledge of interaction requirements. Though a component can be validated against its stand-alone functional and security requirements, two aspects of...

متن کامل

Towards an Approach for Security Risk Analysis in COTS Based Development

More and more companies tend to use secure products as COTS to develop their secure systems due to resource limitations. The security concerns add more complexity as well as potential risks to COTS selection process, and it is always a great challenge for developers to make the selection decisions. In this paper, we provide a method for security risk analysis in COTS based development (CBD) bas...

متن کامل

An Evaluation of A-SQUARE for COTS Acquisition

Developed by the Software Engineering Institute (SEI) at Carnegie Mellon University, Software Quality Requirements Engineering for Acquisition (A-SQUARE) is a methodology used for eliciting and prioritizing security requirements as part of the acquisition process. In the project described in this paper, we evaluated the effectiveness of the A-SQUARE method by applying it to a COTS product for t...

متن کامل

Issues in Developing Security Wrapper Technology for COTS Software Products

The use of Commercial Off-The-Shelf (COTS) software products as components of large-scale systems has become more and more pervasive. One of the interesting questions that has arisen is "Can you build secure applications using insecure components?" We have been investigating ways to protect data that is shared between two or more independent, insecure applications. Our initial attempts to accom...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998