Detecting and Analyzing Insecure Component Integration

نویسندگان

  • Taeho Kwon
  • TAEHO KWON
  • Premkumar Devanbu
  • Hao Chen
چکیده

Component technologies have been widely adopted for designing and engineering software applications and systems, which dynamically integrate software components to achieve desired functionalities. Engineering software in a component-based style has significant benefits, such as improved programmer productivity and software reliability. To support component integration, operating systems allow an application to dynamically load and use a component. Although developers have frequently utilized such a system-level mechanism, programming errors can lead to insecure component integration and serious security vulnerabilities. The security and reliability impact of component integration has not yet been much explored. This dissertation systematically investigates security issues in dynamic component integration and their impact on software security. On the conceptual level, we formulate two types of insecure component integration—unsafe component loading and insecure component usage—and present practical, scalable techniques to detect and analyze them. Our techniques operate directly on software binaries and do not require source code. On the practical level, we have used them to discover new vulnerabilities in popular, real-world software, and show that insecure component integration is prevalent and can be exploited by attackers to subvert important software and systems. Our research has had substantial practical impact and helped to mitigate unsafe component loadings on Microsoft Windows applications. Detecting and Analyzing Insecure Component Integration

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Automated Detection and Analysis of Insecure Component Usage

Software is commonly built from reusable components that provide desired functionalities. Although component reuse significantly improves software productivity, insecure component usage can lead to security vulnerabilities in client applications. For example, we noticed that widely-used IE-based browsers, such as IE Tab, do not enable important security features that IE enables by default, even...

متن کامل

A New Approach for Detecting and Analyzing

page 1/28 A NEW APPROACH FOR DETECTING AND ANALYZING 1 CUTANEOUS REFLEXES DURING LOCOMOTION. 2 3 Maimouna Bagna and Laurent J. Bouyer* 4 5 1. Center for Interdisciplinary Research in Rehabilitation and Social Integration (CIRRIS), 6 Quebec City, QC, Canada 7 2. Department of Rehabilitation, Univ. Laval, Quebec City, QC, Canada 8 9 10 11 12

متن کامل

Integration of Visible Image and LIDAR Altimetric Data for Semi-Automatic Detection and Measuring the Boundari of Features

This paper presents a new method for detecting the features using LiDAR data and visible images. The proposed features detection algorithm has the lowest dependency on region and the type of sensor used for imaging, and about any input LiDAR and image data, including visible bands (red, green and blue) with high spatial resolution, identify features with acceptable accuracy. In the proposed app...

متن کامل

Detecting frauds using customer behavior trend analysis and known scenarios

In this paper a fraud detection method is proposed which user behaviors are modeled using two main components namely the un-normal trend analysis component and scenario based component. The extent of deviation of a transaction from his/her normal behavior is estimated using fuzzy membership functions. The results of applying all membership functions on a transaction will then be infused and a f...

متن کامل

Outlier Detection in Wireless Sensor Networks Using Distributed Principal Component Analysis

Detecting anomalies is an important challenge for intrusion detection and fault diagnosis in wireless sensor networks (WSNs). To address the problem of outlier detection in wireless sensor networks, in this paper we present a PCA-based centralized approach and a DPCA-based distributed energy-efficient approach for detecting outliers in sensed data in a WSN. The outliers in sensed data can be ca...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011