Software Security Models for Service-Oriented Programming (SOP) Platforms
|
|
|
- Millicent Warren
- 10 years ago
- Views:
Transcription
1 Software Security Models for Service-Oriented Programming (SOP) Platforms Soutenance de Thèse de doctorat de: Pierre Parrend Equipe INRIA-Amazones, Laboratoire Citi INSA-Lyon Directeurs de Thèse: Stéphane Ubéda (Pr.) Stéphane Frénot (McF) Jury Rapporteurs: Didier Donsez (Pr. Uni. Grenoble I) Ralf Reusser (Pr. Uni. Karlsruhe) Examinateurs: Ciaran Bryce (MER Uni Genève) Pierre-Etienne Moreau (CR INRIA) 1
2 Context The Evolution of software Monolithic Applications Challenges Management Integration Security Component-based Applications Service-oriented Programming g (SOP) Applications Environnements d exécution pour passerelles domestiques, Yvan Royon, PhD Thesis, December Spontaneous Integration of Services in Pervasive Environments, Noha Ibrahim, PhD Thesis, September
3 Context Motivating example: Dynamic SOP applications WebCamDriver Component Component Repository WebCam WebCam PDA MyContactList Component WebCamDriver Component PDA Java SOP Platform Java SOP Platform (installed on the PDA) (installed on the PDA) What happens if the WebCamDriver Component is a Malware? 3
4 Context Service-oriented programming (SOP) platforms EJB 3.0, OSGi, Spring, Google Guice Publish Component Repository Discover and deploy Interactions At the service level Issuer SOP Platform Host Interactions At the class level 4
5 Context Attack vectors against SOP platforms Example: The Java/OSGi platform Remote Access Exploit Application Vulnerabilities Component Repository User Interface Issuer OSGi Platform Host Exploit OS Vulnerabilities Exploit Component Deployment Exploit SOP Platform Vulnerabilities This work 5
6 Context Contributions 1.sign 2.publish 3.a load Malicious Component Component Repository Protection Domain 3.b check SF-Jarsigner Digital Signature Research Contributions Implementation Enhancement Specification Implementation Hardened OSGi WCA CBAC Host 6
7 Outline Security for Java-based Software Systems Contributions Conclusions 7
8 Security for Java-based Software Systems Building secure software systems: The software development life-cycle Software security assurance Goertzel, et al. Software Security Assurance: a State-of-The-Art Report (SOAR), Monolithic view Systems are built from several mandatory and optional parts 8
9 Security for Java-based Software Systems Identification of suitable protection mechanisms Benefits/cost trade-off Cost estimation Minimal when flaws are repared early Grows dramatically latter in the life-cycle Components Reparation only possible if the code is available Detection otherwise Capers Jones, Applied software measurement: assuring productivity and quality,
10 Security for Java-based Software Systems Java application security: The principles Type safety Objects only perform actions defined through their type Automated memory management Through garbage collection Bytecode validation Executed code is not trusted Isolation of components through class loaders Limitations Prevent naming conflicts between components Security use case: execution of one malicious applets in the JVM Class loaders enforce namespace isolation only 10
11 Security for Java-based Software Systems The Java Security Manager Code by Alice Code by Bob JVM Protection Domain Policy File Java policy file keystore "file:/home/pierre/keystore.ks"; grant signedby "alice" { permission java.io.filepermission "/opt/secret/ secretkeys", "read"; permission org.osgi.framework.package Permission "*", "export"; permission org.osgi.framework.service osgi Permission *"register"; }; grant signedby "bob" { permission org.osgi.framework.service Permission "fr.inria.ares.testservice.myservice", "register"; permission org.osgi.framework.package Permission "*", "export"; }; OSGi: Conditonal Permissions 11
12 Security for Java-based Software Systems Critics of Java permissions High performance overhead 20 to 30 % runtime overhead Cause the withdrawal of security in commercial applications Hard-coded definition of sensitive methods New permissions for new code only Permission hell Must be extracted for each configuration Tedious manual process Runtime verification Abort or execute dangerous calls In mobile apps for instance, authorization depends on the user 12
13 Outline Security for Java-based Software Systems Contributions Building a secure Platform: The SPIP Method Enforcing security for components: CBAC, WCA Conclusions 13
14 Building a secure Platform: The SPIP Method The Spiral Process for Intrusion Prevention The problem Identification of security issues in complex systems For each subsystem Comparison of various implementations Evaluation of protection mechanisms Security assessment Comparison 14
15 Building a secure Platform: The SPIP Method The SPIP Method 15
16 Building a secure Platform: The SPIP Method Quantification of the security of a system: the Protection Rate Security level of complex systems Not a binary metric: never free of vulnerabilities Percentage of the known vulnerabilities that are protected Against a reference system (here: an OSGi implementation with all known vulnerabilities) Based on the Attack Surface metric (Measuring Relative Attack Surfaces, Howard, 2005.) Enables to Assess individual id security mechanisms Compare execution environments Security Benchmarks of OSGi Platforms: Toward Hardened OSGi, Software, Practice and Experience,
17 Building a secure Platform: The SPIP Method Implementation for the OSGi platform Iteration 1: The Java/OSGi platform Iteration 2.. 4: Propositions Hardened OSGi Component-based Access Control - CBAC Weak Component Analysis - WCA Iteration 5: Integration with the JnJVM, a secure JVM implementation for OSGi applications 17
18 Building a secure Platform: The SPIP Method Results: The vulnerability catalogs Malicious Bundles Service Binding Vulnerability Category # Local Access Control Management - Java Components Vulnerabilities - An Experimental Classification Targeted at the OSGi Platform, INRIA Research Report, SOP Component Platform JVM Service Layer Module Layer Life-Cycle Layer API Language Invalid Workflow 1 No control on service registration 2 Invalid Metadata 3 Fragments 3 Invalid Archive Invalid Activator Bundle Management Proper removal Native Code execution File Handling Reflection ClassLoader No algorithm safety Runtime stopping 2 Runtime methods Software Software Security Security Models Models for for SOP SOP Platforms Thread management Platforms 4 Implementation (not considered) Optimization errors
19 Building a secure Platform: The SPIP Method Results: The vulnerability catalogs Vulnerable Bundles Vulnerability Category # Objects (Services) Flaws in parameter validation Exposed Internal Representation Synchronization Component Classes Exposed Internal Representation ti Avoidable Calls to the Security Manager 4 9 Stand- Alone Serialization 1 More Vulnerabilities in the Java/OSGi Platform: a Focus on Bundle Interactions, INRIA Research Report,
20 Building a secure Platform: The SPIP Method Results: Protection Rate for mainstream OSGi platforms Platform Type # of protected Vulns # of identified Vulns Concierge % Felix ,1 % Knopflerfish ,2 % Equinox % Java Permissions % Concierge with Permissions % Felix with Permissions % Knopflerfish with Permissions % Equinox with Permissions % Protection Rate 20
21 Building a secure Platform: The SPIP Method Results: Hardened OSGi Protection Rate: 25 % for the Malicious Bundles catalog entries Security Benchmarks of OSGi Platforms: Toward Hardened OSGi, Software, Practice and Experience, Introduce Systematize Check component size before download, and control the cumulated size of loaded components Check digital signature at install time Launch the component activator in a separate Thread Limit the number of registered services Do not reject harmless unnecessary metadata Remove all component data from disk at uninstallation Hardened OSGi Host 21
22 Outline Security for Java-based Software Systems Contributions Building a secure Platform: The SPIP Method Enforcing security for components: CBAC, WCA Conclusions 22
23 The problem Enforcing Security for Components: CBAC, WCA Security issues with components Maliciousness Vulnerability Installing secure components Bytecode analysis only 23
24 Enforcing Security for Components: CBAC, WCA Definition of tools in the SPIP method 24
25 Enforcing Security for Components: CBAC, WCA The CBAC model: Principles Component-based p Access Control Goal Prevent issues from the Malicious Bundles catalog Principles Install time analysis of the execution rights of components Sensitive calls must be explicitly granted Take composition into account Intends to be an alternative to Java permissions i Hypotheses The component platform is not modified Each component contains a valid digital signature Component-based Access Control: Secure Software Composition through Static Analysis, Software Composition, OSGi Platform CBAC Host 25
26 Enforcing Security for Components: CBAC, WCA The CBAC model: Definition 26
27 Enforcing Security for Components: CBAC, WCA The CBAC model: Performances CBAC Check Only Signature Check 1500 Time (ms s) ,33 7,62 10,32 12,23 13,72 17,71 34,06 52,2 86,37 356,76 5,51 6,49 7,92 11,74 13,42 14,28 24,92 38,72 76,94 131,48 Size (KBytes) 27
28 Enforcing Security for Components: CBAC, WCA The CBAC model: Benefits and limitations Benefits No runtime overhead, reduced install time overhead No application interruption, at the cost of false positive No misleading pop-up windows Arbitrary methods and meta-data can be set as sensitive Enables to protect against vulnerabilities that are discovered after design Protection Rate: 50 % for the Malicious Bundles catalog entries Limitations Policies must be defined in advanced 28
29 Enforcing Security for Components: CBAC, WCA The WCA approach: Principles Weak Component p Analysisy Goal Prevent issues from the Vulnerable Bundles catalog Principles Vulnerability identification through static analysis In exposed code only Through the code meta-model Matching with vulnerability patterns Development and install time use XML version for flexibility Hardcoded version for performance Enhancing Automated Detection of Vulnerabilities in Java Components, International Conference on Availability, Reliability and Security (AReS 2009). OSGi Platform WCA Host 29
30 Enforcing Security for Components: CBAC, WCA The WCA approach: Performances ) Time (ms) Hardcoded Reject check Hardcoded Report check XML Report check ,49 4,28 11,91 18,73 43,31 155,3 406,34 8,12 16,79 23,97 99,65 259,45 713,6 Bundle size (KBytes) 30
31 Enforcing Security for Components: CBAC, WCA The WCA approach: Benefits and limitations Benefits Identification of exploitable vulnerabilities in Java components According to the exposition of the code Principally easy to extend Development and runtime use Protection Rate: 36 % for the Vulnerable Bundles catalog entries Limitations of the implementation Hardcoded d d version is slower Only structural patterns are supported so far Limited flexibility of the definition of patterns 31
32 Outline Security for Java-based Software Systems Contributions Conclusions 32
33 Conclusions Development overview 1.sign 2.publish 3.a load Malicious i Component Component Repository Protection Domain SF-Jarsigner Research Contributions Implementation Enhancement Specification Implementation 3.b check Digital Signature Hardened OSGi WCA CBAC Host Tool Lines of Code Digital Signature 330 SF-JarSigner 557 Malicious Components 155 bundles Hardened OSGi 224 CBAC 577 WCA
34 Conclusions Evaluation of the proposed solutions SPIP Promising methodology for security analysis Requires Validation on further systems Support for cost estimation Tools for secure component-based applications CBAC WCA Refined static analysis approach Only a subset of best practices are enforced so far Need of actual isolation between the bundles Consider further attack vectors 34
35 Conclusions Who can benefit from this work? Role Platform developer Application architect Application developer Focus on Execution environment Architecture Components System entity Platform Components Components Life-Cycle Platform Application Application Activity design and coding design Coding Our propositions Security analysis for the Platform Security analysis for all Hardened OSGi CBAC WCA Integration Security analysis for the Components 35
36 Conclusions Open challenges Resource isolation First solution: Integration with the JnJVM Development for industrial use of the OSGi platform Specifications Life-cycle support for bundles Management Critical applications: strong isolation between applications Multi-user applications: strong access control mechanism 36
37 Questions? 1.sign 2.publish 3.a load Malicious Component Component Repository Protection Domain 3.b check SF-Jarsigner Digital Signature Research Contributions Implementation Enhancement Specification Implementation Hardened OSGi WCA CBAC Host 37
38 References Karen M. Goertzel, Thoedore Winograd, Holly L. McKinley, Lyndon Oh, Michael Colon, Thomas Mcibbon, Elaine Fedchak, and Robert Vienneau. Software Security Assurance: a State-of-The-Art Report (SOAR). Information Assurance Technology Analysis Center (IATAC) and Data and Analysis Center for Software (DACS), July Michael Howard, Jon Pincus, and Jeanette M. Wing. Computer Security in the 21st Century, chapter Measuring Relative Attack Surfaces, pages Springer, March Capers Jones. Applied software measurement: assuring productivity and quality. McGraw-Hill, Inc., New York, NY, USA, Yvan Royon, Environnements d exécution pour passerelles domestiques, PhD Thesis, INSA-Lyon, December Noha Ibrahim, Spontaneous Integration of Services in Pervasive Environments, PhD Thesis, INSA-Lyon, September
39 Selected Publications Journal Article Security Benchmarks of OSGi Platforms: Toward Hardened OSGi, Pierre Parrend, Stephane Frénot, Software, Practice and Experience. Accepted for publication (September 2008). International Conferences, Industrial Conferences Enhancing Automated Detection of Vulnerabilities in Java Components, Pierre Parrend, Forth International Conference on Availability, Reliability and Security (AReS 2009), Fukuoka, Japan, 16th 19th March Classification of Component Vulnerabilities in Java Service Oriented Programming (SOP) Platforms, Parrend, Stéphane Frenot, Conference on Component-based Software Engineering, Karlsruhe, Germany, October Component-based Access Control: Secure Software Composition through Static Analysis, Pierre Parrend, Stéphane Frenot, Software Composition, Budapest, Hungary, March Multi-service, Multi-protocol Management for Residential Gateways Home Network Management, Y. Royon, P. Parrend, S. Frénot, S. Papastefanos, H. Abdelnur, D. Van de Poel, S. Frenot, BB Europe, Antwerp, December 3-6, Research Reports More Vulnerabilities in the Java/OSGi Platform: a Focus on Bundle Interactions, Pierre Parrend, Stephane Frenot, INRIA Research Report n 6649, September Java Components Vulnerabilities - An Experimental Classification Targeted at the OSGi Platform, Pierre Parrend, Stéphane Frenot, INRIA Research Report n 6231, June
The OSGi Platform: A promising Approach for building secure Java-based Applications
The OSGi Platform: A promising Approach for building secure Java-based Applications Pierre Parrend [email protected] Lab. CITI, 21, Avenue J. Capelle 69621 Vileurbanne Cedex Introduction Context
Software Security Models for Service-Oriented Programming (SOP) Platforms. Pierre PARREND
N o d ordre : 2008 ISAL 0117 Année 2008 Thèse Software Security Models for Service-Oriented Programming (SOP) Platforms À présenter devant l Institut National des Sciences Appliquées de Lyon École Doctorale
Efficient Monitoring of OSGi Applications
Degree project Efficient Monitoring of OSGi Applications Author: Portero Aníbal Supervisor: Abbas Nadeem Date: 2013-08-27 Course Code: 2DV00E, 15 credits Level: Bachelor Department of Computer Science
Equinox Framework: A Happier OSGi R6 Implementation
Equinox Framework: A Happier OSGi R6 Implementation Tom Watson IBM March 18 th 2014 OSGi Alliance Marketing 2008-2010 Page. 1 All Rights Reserved Agenda New to OSGi R6 Core Redesign Core Equinox and Why
FUSE-ESB4 An open-source OSGi based platform for EAI and SOA
FUSE-ESB4 An open-source OSGi based platform for EAI and SOA Introduction to FUSE-ESB4 It's a powerful OSGi based multi component container based on ServiceMix4 http://servicemix.apache.org/smx4/index.html
GlassFish v3. Building an ex tensible modular Java EE application server. Jerome Dochez and Ludovic Champenois Sun Microsystems, Inc.
GlassFish v3 Building an ex tensible modular Java EE application server Jerome Dochez and Ludovic Champenois Sun Microsystems, Inc. Agenda Java EE 6 and GlassFish V3 Modularity, Runtime Service Based Architecture
Developing modular Java applications
Developing modular Java applications Julien Dubois France Regional Director SpringSource Julien Dubois France Regional Director, SpringSource Book author :«Spring par la pratique» (Eyrolles, 2006) new
The evolution of virtual endpoint security. Comparing vsentry with traditional endpoint virtualization security solutions
The evolution of virtual endpoint security Comparing vsentry with traditional endpoint virtualization security solutions Executive Summary First generation endpoint virtualization based security solutions
Outline SOA. Properties of SOA. Service 2/19/2016. Definitions. Comparison of component technologies. Definitions Component technologies
Szolgáltatásorientált rendszerintegráció Comparison of component technologies Simon Balázs, BME IIT Outline Definitions Component technologies RPC, RMI, CORBA, COM+,.NET, Java, OSGi, EJB, SOAP web services,
Put a Firewall in Your JVM Securing Java Applications!
Put a Firewall in Your JVM Securing Java Applications! Prateep Bandharangshi" Waratek Director of Client Security Solutions" @prateep" Hussein Badakhchani" Deutsche Bank Ag London Vice President" @husseinb"
OSGi Remote Management
OSGi Remote Management INCREASE OUR Date 20-11-2006 Miguel García Longarón - [email protected] Present situation OSGi is being applied in several domains Each domain has own solution for remote management Home
Converting Java EE Applications into OSGi Applications
Converting Java EE Applications into OSGi Applications Author: Nichole Stewart Date: Jan 27, 2011 2010 IBM Corporation THE INFORMATION CONTAINED IN THIS REPORT IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY.
CSCI E 98: Managed Environments for the Execution of Programs
CSCI E 98: Managed Environments for the Execution of Programs Draft Syllabus Instructor Phil McGachey, PhD Class Time: Mondays beginning Sept. 8, 5:30-7:30 pm Location: 1 Story Street, Room 304. Office
How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering
Interactive Application Security Testing (IAST)
WHITEPAPER Interactive Application Security Testing (IAST) The World s Fastest Application Security Software Software affects virtually every aspect of an individual s finances, safety, government, communication,
Virtual Machine Security
Virtual Machine Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ 1 Operating System Quandary Q: What is the primary goal
DELL. Unified Server Configurator: IT and Systems Management Overview. A Dell Technical White Paper
DELL A Dell Technical White Paper Unified Server Configurator: IT and Systems Management Overview By Shelli Allgood, Anand Narayanan, Hai Phung, Pritesh Prabhu and Ganesh Viswanathan THIS WHITE PAPER IS
Operations and Monitoring with Spring
Operations and Monitoring with Spring Eberhard Wolff Regional Director and Principal Consultant SpringSource Copyright 2009 SpringSource. Copying, publishing or distributing without express written permission
Mobile Devices and Malicious Code Attack Prevention
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Malicious Code and Mobile Devices: Best Practices for Securing Mobile Environments Sponsored
SERVICE ORIENTED ARCHITECTURE
SERVICE ORIENTED ARCHITECTURE Introduction SOA provides an enterprise architecture that supports building connected enterprise applications to provide solutions to business problems. SOA facilitates the
NetDefend Firewall UTM Services
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering (WCF) for superior
A common interface for multi-rule-engine distributed systems
A common interface for multi-rule-engine distributed systems Pierre de Leusse, Bartosz Kwolek and Krzysztof Zieliński Distributed System Research Group, AGH University of Science and Technology Krakow,
Eclipse 4 RCP application Development COURSE OUTLINE
Description The Eclipse 4 RCP application development course will help you understand how to implement your own application based on the Eclipse 4 platform. The Eclipse 4 release significantly changes
Outline. Introduction. State-of-the-art Forensic Methods. Hardware-based Workload Forensics. Experimental Results. Summary. OS level Hypervisor level
Outline Introduction State-of-the-art Forensic Methods OS level Hypervisor level Hardware-based Workload Forensics Process Reconstruction Experimental Results Setup Result & Overhead Summary 1 Introduction
Business Process Management Enabled by SOA
Business Process Management Enabled by SOA Jyväskylä 8.5.2007 Kimmo Kaskikallio IT Architect IBM Software Brands Five middleware product lines designed to work together Service-Oriented Architecture (SOA)
Android Developer Fundamental 1
Android Developer Fundamental 1 I. Why Learn Android? Technology for life. Deep interaction with our daily life. Mobile, Simple & Practical. Biggest user base (see statistics) Open Source, Control & Flexibility
The Virtualization Practice
The Virtualization Practice White Paper: Managing Applications in Docker Containers Bernd Harzog Analyst Virtualization and Cloud Performance Management October 2014 Abstract Docker has captured the attention
Popular Android Exploits
20-CS-6053 Network Security Spring, 2016 An Introduction To Popular Android Exploits and what makes them possible April, 2016 Questions Can a benign service call a dangerous service without the user knowing?
zen Platform technical white paper
zen Platform technical white paper The zen Platform as Strategic Business Platform The increasing use of application servers as standard paradigm for the development of business critical applications meant
2 Introduction to Java. Introduction to Programming 1 1
2 Introduction to Java Introduction to Programming 1 1 Objectives At the end of the lesson, the student should be able to: Describe the features of Java technology such as the Java virtual machine, garbage
Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery
Overview Password Manager Pro offers a complete solution to control, manage, monitor and audit the entire life-cycle of privileged access. In a single package it offers three solutions - privileged account
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
BYPASSING THE ios GATEKEEPER
BYPASSING THE ios GATEKEEPER AVI BASHAN Technology Leader Check Point Software Technologies, Ltd. OHAD BOBROV Director, Mobile Threat Prevention Check Point Software Technologies, Ltd. EXECUTIVE SUMMARY
NetDefend Firewall UTM Services
Product Highlights Intrusion Prevention System Dectects and prevents known and unknown attacks/ exploits/vulnerabilities, preventing outbreaks and keeping your network safe. Gateway Anti Virus Protection
Federal Enterprise Architecture and Service-Oriented Architecture
Federal Enterprise Architecture and Service-Oriented Architecture Concepts and Synergies Melvin Greer Chief Strategist, SOA / Cloud Computing Certified Enterprise Architect Copyright August 19, 2010 2010
IPOJO: A FLEXIBLE SERVICE-ORIENTED COMPONENT MODEL FOR DYNAMIC SYSTEMS
IPOJO: A FLEXIBLE SERVICE-ORIENTED COMPONENT MODEL FOR DYNAMIC SYSTEMS Clement Escof-ier PhD Defense, December 3 rd 2008 Université Joseph Fourier, Grenoble Jury Laurence Nigay, Présidente, Professeur,
ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY
ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY Suhas Holla #1, Mahima M Katti #2 # Department of Information Science & Engg, R V College of Engineering Bangalore, India Abstract In the advancing
Providing Load Balancing and Fault Tolerance in the OSGi Service Platform
Providing Load Balancing and Fault Tolerance in the OSGi Service Platform ARNE KOSCHEL, THOLE SCHNEIDER, JOHANNES WESTHUIS, JÜRGEN WESTERKAMP Faculty IV, Department of Computer Science University of Applied
1 What Are Web Services?
Oracle Fusion Middleware Introducing Web Services 11g Release 1 (11.1.1.6) E14294-06 November 2011 This document provides an overview of Web services in Oracle Fusion Middleware 11g. Sections include:
RE-TRUST Design Alternatives on JVM
RE-TRUST Design Alternatives on JVM ( - Italy) [email protected] http://softeng.polito.it/falcarin Trento, December, 19 th 2006 Tamper-Detection Tamper-detection goals Detect malicious modifications
IKAN ALM Architecture. Closing the Gap Enterprise-wide Application Lifecycle Management
IKAN ALM Architecture Closing the Gap Enterprise-wide Application Lifecycle Management Table of contents IKAN ALM SERVER Architecture...4 IKAN ALM AGENT Architecture...6 Interaction between the IKAN ALM
Apache Sling A REST-based Web Application Framework Carsten Ziegeler [email protected] ApacheCon NA 2014
Apache Sling A REST-based Web Application Framework Carsten Ziegeler [email protected] ApacheCon NA 2014 About [email protected] @cziegeler RnD Team at Adobe Research Switzerland Member of the Apache
1 What Are Web Services?
Oracle Fusion Middleware Introducing Web Services 11g Release 1 (11.1.1) E14294-04 January 2011 This document provides an overview of Web services in Oracle Fusion Middleware 11g. Sections include: What
Data Mining Governance for Service Oriented Architecture
Data Mining Governance for Service Oriented Architecture Ali Beklen Software Group IBM Turkey Istanbul, TURKEY [email protected] Turgay Tugay Bilgin Dept. of Computer Engineering Maltepe University Istanbul,
Component Based Development in Software Engineering
Component Based Development in Software Engineering Amandeep Bakshi, Rupinder Singh Abstract--In today s world, Component Based development is an active research area for more than a decade in software
SOFTWARE ASSET MANAGEMENT Continuous Monitoring. September 16, 2013
SOFTWARE ASSET MANAGEMENT Continuous Monitoring September 16, 2013 Tim McBride National Cybersecurity Center of Excellence [email protected] David Waltermire Information Technology Laboratory [email protected]
Defending Behind The Device Mobile Application Risks
Defending Behind The Device Mobile Application Risks Tyler Shields Product Manager and Strategist Veracode, Inc Session ID: MBS-301 Session Classification: Advanced Agenda The What The Problem Mobile Ecosystem
Homeland Security Red Teaming
Homeland Security Red Teaming Directs intergovernmental coordination Specifies Red Teaming Viewing systems from the perspective of a potential adversary Target hardening Looking for weakness in existing
How To Secure Cloud Computing
Resilient Cloud Services By Hemayamini Kurra, Glynis Dsouza, Youssif Al Nasshif, Salim Hariri University of Arizona First Franco-American Workshop on Cybersecurity 18 th October, 2013 Presentation Outline
Service Oriented Architecture (SOA) Architecture, Governance, Standards and Technologies
Service Oriented Architecture (SOA) Architecture, Governance, Standards and Technologies 3-day seminar Give Your Business the Competitive Edge SOA has rapidly seized the momentum and center stage because
Lecture 17: Mobile Computing Platforms: Android. Mythili Vutukuru CS 653 Spring 2014 March 24, Monday
Lecture 17: Mobile Computing Platforms: Android Mythili Vutukuru CS 653 Spring 2014 March 24, Monday Mobile applications vs. traditional applications Traditional model of computing: an OS (Linux / Windows),
.NET and J2EE Intro to Software Engineering
.NET and J2EE Intro to Software Engineering David Talby This Lecture.NET Platform The Framework CLR and C# J2EE Platform And Web Services Introduction to Software Engineering The Software Crisis Methodologies
Developing Service-Oriented Architecture Applications with OSGi
Developing Service-Oriented Architecture Applications with OSGi Dr Mark Little, Kevin Conner (Red Hat), Keith Babo (Sun), Alexandre Alves (BEA) BOF-5846 Overview Using OSGi in real-world Service Oriented
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Software Development: The Next Security Frontier
James E. Molini, CISSP, CSSLP Microsoft Member, (ISC)² Advisory Board of the Americas [email protected] http://www.codeguard.org/blog Software Development: The Next Security Frontier De-perimiterization
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise
TECHNOLOGY WHITE PAPER. Application Performance Management. Introduction to Adaptive Instrumentation with VERITAS Indepth for J2EE
TECHNOLOGY WHITE PAPER Application Performance Management Introduction to Adaptive Instrumentation with VERITAS Indepth for J2EE TABLE OF CONTENTS ABOUT ADAPTIVE INSTRUMENTATION 3 WHY ADAPTIVE INSTRUMENTATION?
Analysis of advanced issues in mobile security in android operating system
Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of
... Mobile App Reputation Services THE RADICATI GROUP, INC.
. The Radicati Group, Inc. 1900 Embarcadero Road, Suite 206 Palo Alto, CA 94303 Phone 650-322-8059 Fax 650-322-8061 http://www.radicati.com THE RADICATI GROUP, INC. Mobile App Reputation Services Understanding
Managing Complexity in Mobile Application Deployment Using the OSGi Service Platform
Managing Complexity in Mobile Application Deployment Using the OSGi Service Platform Rafiul Ahad, Ph.D. Vice President, Mobile Products and Services Oracle Corporation copyright 2004 by OSGi Alliance All
How to Secure Infrastructure Clouds with Trusted Computing Technologies
How to Secure Infrastructure Clouds with Trusted Computing Technologies Nicolae Paladi Swedish Institute of Computer Science 2 Contents 1. Infrastructure-as-a-Service 2. Security challenges of IaaS 3.
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Delivering Quality in Software Performance and Scalability Testing
Delivering Quality in Software Performance and Scalability Testing Abstract Khun Ban, Robert Scott, Kingsum Chow, and Huijun Yan Software and Services Group, Intel Corporation {khun.ban, robert.l.scott,
JAVA WEB START OVERVIEW
JAVA WEB START OVERVIEW White Paper May 2005 Sun Microsystems, Inc. Table of Contents Table of Contents 1 Introduction................................................................. 1 2 A Java Web Start
WebSphere Server Administration Course
WebSphere Server Administration Course Chapter 1. Java EE and WebSphere Overview Goals of Enterprise Applications What is Java? What is Java EE? The Java EE Specifications Role of Application Server What
SOA @ ebay : How is it a hit
SOA @ ebay : How is it a hit Sastry Malladi Distinguished Architect. ebay, Inc. Agenda The context : SOA @ebay Brief recap of SOA concepts and benefits Challenges encountered in large scale SOA deployments
How To Develop An Open Play Context Framework For Android (For Android)
Dynamix: An Open Plug-and-Play Context Framework for Android Darren Carlson and Andreas Schrader Ambient Computing Group / Institute of Telematics University of Lübeck, Germany www.ambient.uni-luebeck.de
Effective Software Security Management
Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta [email protected] / [email protected] Table of Contents Abstract... 1
Why IBM WebSphere Application Server V8.0?
Why IBM Application Server V8.0? Providing the right application foundation to meet your business needs Contents 1 Introduction 2 Speed the delivery of new applications and services 3 Improve operational
The Enterprise Service Bus
1 ESBs: Essential Infrastructure for a Successful SOA March 2005 2 at a glance Customers include world s largest firms! 80% of Global Telecom! 70% of Financial Services in Global 100! Blue Chip System
Software Engineering. Software Engineering. Component-Based. Based on Software Engineering, 7 th Edition by Ian Sommerville
Software Engineering Component-Based Software Engineering Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To explain that CBSE is concerned with developing standardised components
CS52600: Information Security
CS18000: Programming I CS52600: Information Security Vulnerability Analysis 15 November 2010 Prof. Chris Clifton Vulnerability Analysis Vulnerability: Lapse in enforcement enabling violation of security
INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe
INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN Albin Penič Technical Team Leader Eastern Europe Trend Micro 27 years focused on security software Headquartered
HP Systinet. Software Version: 10.01 Windows and Linux Operating Systems. Concepts Guide
HP Systinet Software Version: 10.01 Windows and Linux Operating Systems Concepts Guide Document Release Date: June 2015 Software Release Date: June 2015 Legal Notices Warranty The only warranties for HP
Expansion of a Framework for a Data- Intensive Wide-Area Application to the Java Language
Expansion of a Framework for a Data- Intensive Wide-Area Application to the Java Sergey Koren Table of Contents 1 INTRODUCTION... 3 2 PREVIOUS RESEARCH... 3 3 ALGORITHM...4 3.1 APPROACH... 4 3.2 C++ INFRASTRUCTURE
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4 Gordon MacKay Digital Defense, Inc. Chris Wysopal Veracode Session ID: Session Classification: ASEC-W25 Intermediate AGENDA Risk Management Challenges
Enterprise Apps: Bypassing the Gatekeeper
Enterprise Apps: Bypassing the Gatekeeper By Avi Bashan and Ohad Bobrov Executive Summary The Apple App Store is a major part of the ios security paradigm, offering a central distribution process that
Android Security. Giovanni Russello [email protected]
Android Security Giovanni Russello [email protected] N-Degree of Separation Applications can be thought as composed by Main Functionality Several Non-functional Concerns Security is a non-functional
Business-Driven Software Engineering Lecture 3 Foundations of Processes
Business-Driven Software Engineering Lecture 3 Foundations of Processes Jochen Küster [email protected] Agenda Introduction and Background Process Modeling Foundations Activities and Process Models Summary
White Paper. Time for Integrated vs. Bolted-on IT Security. Cyphort Platform Architecture: Modular, Open and Flexible
White Paper Time for Integrated vs. Bolted-on IT Security Cyphort Platform Architecture: Modular, Open and Flexible Overview This paper discusses prevalent market approaches to designing and architecting
The Oracle Fusion Development Platform
The Oracle Fusion Development Platform Juan Camilo Ruiz Senior Product Manager Development Tools 1 The preceding is intended to outline our general product direction. It is intended for information purposes
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT
CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT How advancements in automated security testing software empower organizations to continuously measure information
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
SOA and API Management
SOA and API Management Leveraging Your Investment in Service Orientation Version 1.0 December 2013 John Falkl General Manager, Technology, Strategy & Integration Haddon Hill Group, Inc. Contents Introduction...
Course Description. Course Audience. Course Outline. Course Page - Page 1 of 5
Course Page - Page 1 of 5 WebSphere Application Server 7.0 Administration on Windows BSP-1700 Length: 5 days Price: $ 2,895.00 Course Description This course teaches the basics of the administration and
A Dynamic, Runtime-Extensible, Client-Managed Service Framework
A Dynamic, Runtime-Extensible, Client-Managed Service Framework D. Parry G. Wells, P. Clayton Computer Science Department Rhodes University Grahamstown, 6140 Email: [email protected] Tel: (046) 603 8640
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK John T Lounsbury Vice President Professional Services, Asia Pacific INTEGRALIS Session ID: MBS-W01 Session Classification: Advanced
