Project Software Security: Securing SendMail with JAAS and Polymer
|
|
|
- Gordon Arnold
- 10 years ago
- Views:
Transcription
1 Project Software Security: Securing SendMail with JAAS and Polymer Frank van Vliet Diego Ortiz Yepes Jornt van der Wiel Guido Kok 1 Introduction In this project, we develop a simple SendMail application which is then secured using two different technologies: the Java Authentication and Authorization Service (JAAS) [1] -for the authentication tasks-, and Polymer [2] -a research runtime security monitor- for the authorization tasks. The (unsecured) SendMail application design is discussed in Section 2, followed by its security aspects in Section 3. Subsequently, Section 4 compares JAAS and Polymer based on the experience in this project. Finally, the conclusions are presented in Section 5. 2 SendMail Design The SendMail application is expected to allow users to send messages via a SMTP server. For this purpose, when invoking the application they have to provide the smtp server name, the address of the originator, the address of the recipient, the message subject, and the message contents (body). The application will examine these five parameters and if they are well-defined, the message will be created and sent using the Java Mail API [3]. Figure 1 presents the sequence diagram of the main actions performed by the application to send an message. As shown in Figure 2, when sending an message, a Session object is instantiated (representing a SMTP run with the mail server) and a MimeMessage object is created and configured according to the message parameters (representing the message itself). The latter is transmitted to the specified SMTP server using the the Transport class. More information can be found in the Java Mail API [3]. Figure 1: Successful sequence of the SendMail class 1
2 Figure 2: Class diagram of the Sendmail Application 3 SendMail Security The main focus of this project is securing a SendMail application in such a way that any message that it sends must have been originated by a valid, logged on user whose username corresponds to the address of the message originator. In other words, according to the security policy it should not be possible for a user to send messages from any other address than her own. Since the SendMail application is quite simple, it could have been easily secured by conventional means. However, a different approach consisting of delegating the authentication and authorisation on JAAS [1] and Polymer [4] resp. was used for this project. The particulars of this approach are presented in the remaining parts of this section. 3.1 JAAS After reviewing the JAAS authentication tutorial [5] and the JAAS documentation [1], we concluded that it was required to implement two classes: A Principal We named it PasswordPrincipal as it is related to a user who authenticated using her password. It corresponds to a user name, which for the SendMail application is expected -but not restrictedto be an address. A LoginModule We named it PasswordAuthenticationModule (as requested by the project statement). It is responsible for authentication of users based on their username and password. The main decisions that we took regarding this module were: User names are stored along with the hash of a salt concatenated with the password in a password file. We decided upon hashing rather than encryption since hashing takes less time and offers enough security for our purposes. Note that the salt is used to add some randomness to the hashed values (passwords). Passwords are stored in memory for as short as possible. In fact, once password verification succeeds, the password is immediately erased from memory. The PasswordFileManager disallows de-serialization, as this could be used by an attacker to specify an arbitrary password file. A similar reasoning leaded to disallowing serialization and de-serialization of the PasswordAuthenticationModule. The location of the password file is not hardcoded, but can be specified via the JAAS configuration file, which adds flexibility to our application. Note that we assume that the JAAS configuration file is protected by suitable means so an attacker cannot specify an arbitrary password file through it. A separate class (PasswordFileManager) performing username/password verification was created in order to clearly separate the authentication responsibilities. 2
3 Figure 3: Sequence diagram of the secured SendMail Application using JAAS and Polymer All the design decisions presented above were taken in order to reduce potential threats, except the last two, which were motivated by architectural reasons. At the moment we do not see any new vulnerabilities introduced by our design decisions. The classes related to the authentication part (using JAAS) can be easily identified in the updated class and sequence diagrams illustrated in Figures 3 and 4 as their borders appear in a lighter colour. 3.2 Polymer Polymer [2] allows a policy to monitor the invocation of methods, allowing it to decide at run-time whether such invocations should be permitted or not. Policies can be applied to all Java applications, even when the source code is not known. To secure the SendMail application with Polymer, the policy as illustrated in Figure 5 was implemented. This policy is a combination of the generic sub-policies on the left branch 1 and a new sub-policy named Login, which ensures that all s are sent from the address of the logged in user. In order to accomplish these goals, the policy monitors and intercepts any calls to the following methods, which are identified by the thick arrow lines in Figure 3 2 : javax.security.auth.login.logincontext.login When the application invokes the login method on a LoginContext object, this object later contains all information regarding the logged in user (as a reference to a Subject object). As this information is required to make a decision in the javax.mail.transport.send method, a reference to the LoginContext is stored in the policy object. Note that all invocations of this method are allowed since the only goal is to store the reference to the LoginContext. javax.mail.transport.send When the application tries to send an , the policy only allows it if the logged in user matches the message s from address. To make this decision, the reference to the LoginContext object is used to retrieve the current user s Subject. Then, the address of the message originator is compared to the PasswordPrincipal which was added to the user s Subject during the login process. In case that the addresses match, the is allowed to be sent, otherwise, the SendMail application is halted by Polymer. 1 These policies prevent any target from loading classes itself or executing system commands, and are not specific to the SendMail application. 2 We acknowledge that as Polymer monitors the complete application it should be associated with all the classes loaded at run time. Further, polymer in Figure 3 represents all classes related to Polymer (including for instance the bytecoderewriter). However, our purpose in this diagram is to identify the exact places where it actually intercepts the security sensitive calls. 3
4 Figure 4: Class diagram of the secured SendMail Application using JAAS and Polymer Policy Conjunction Dominates Login Conjunction Dis- SysCalls Class- Loaders NoOpen- ClassFiles Figure 5: Policy for the SendMail application 4
5 In this simple design, the user s address equals her username. In a real life situations, users might have multiple addresses and a database should be used. It is also assumed that the program uses a valid JAAS authentication module to authenticate her users. In fact, the system administrator should ensure that a current and genuine JAAS authentication module is used, since such module is trusted by the policy to report the logged in username. Furthermore, it is important to note that only the javax.mail.transport.send method is restricted by the Login sub-policy. There are many other ways to send messages, for instance, by directly opening a socket to an SMTP server. In this line of thought, it is then our opinion that for unknown applications policies should be implemented at the lowest possible layer, for instance, at the socket API methods. 3.3 Security Overview and Assumptions Securing an application with JAAS and Polymer is a very interesting idea because it allows separating the application functionality from the security concern. Furthermore, it allows reusing existing infrastructures specifically designed to provide security services, not having to reinvent the wheel in order to use these services in the secured application. It is important to bear in mind, however, that just by using JAAS and Polymer it cannot be claimed that the application is 100% secure. In fact, there are other layers where further security measures are required, which are assumed to be provided by other suitable means. For instance, it should be impossible for regular users to access both the password file or the JAAS configuration file. Further, the Polymer design imposes three requirements in order to effectively secure an application. First, the application should be invoked by Polymer and not directly by the JVM; second, all libraries (including the JRE) which are used by the application should have been instrumented by Polymer prior to execution; and third, any class used by the application must be loaded by Polymer s class loader. We assume that there is no way for a malicious user to bypass any of this requirements, as doing so would result in the application not being effectively monitored by Polymer. Provided that these security assumptions hold, we consider that the SendMail application adequately satisfies the security requirement that the logged in user should match the originator address of any message sent using the application. 4 JAAS versus Polymer From our experience with JAAS, we would like to remark the following facts: 1. Using it is as easy as using any other Java API functionality (it is included in the JDK). 2. Understanding it and using it is an uncomplicated task due to the completeness of its documentation. 3. Its architectural design is nice: the possibility of creating, using and combining arbitrary authentication modules is particularly remarkable. 4. It is a pity that an extensive library/collection of audited JAAS authentication modules is not available. On the other hand, regarding Polymer, we consider it important to mention that: 1. It allows a clear separation of concerns, in this case, security. 2. Policies can be reused across applications. 3. It is flexible: it allows the designer to specify policies at the method call level, which is quite powerful. However, its flexibility could be improved by allowing the usage of dynamic information in the action declaration file, besides the static method information (method signature) which is currently supported. This would allow the monitor to determine whether calls match a given action based on such dynamic information The compositionality of policies is a superb feature. The fact that policies can be structurally composed using combinators and selectors allows implementing complex security policies in an easily and understandable way. 3 This functionality is mentioned in [2] but it does not seem to be implemented in the code 5
6 5. Learning how to use it is difficult, mainly due to the following reasons: There is almost no documentation. Naming in [2] and the actual implementation differs. For example, what in the paper are referred as IrrSugs, in the code are referred as UnregSuggestions. There are no guidelines on how to write good policies. 6. The distribution of Polymer found at the Leuven website [6] contains an ant script file. We think that the original distribution [4] should have this file too because ant -unlike make- is portable across different platforms. 7. When Polymer instruments a method like send of the class Transport, it copies this method to Transport send $$POLY METHOD$$ (a backdoor method). It then creates its own send method which calls the backdoor Transport send $$POLY METHOD$$ method if the policy allows it. When instrumenting a private method, the backdoor method is made PUBLIC, to make it accessible from the Polymer classes. This is a very important security-breaking design flaw. Now the private methods which are instrumented can be accessed by any other class by invoking the backdoor method. Polymer tries to reduce this problem by denying invocations of backdoor methods while loading and instrumenting the classes. However, it does not instrument classes in the TCB packages: sun., com.sun., javax., java. and polymer (as defined in the constructor of polymer.polymerclassloader. In this order of ideas, to call one of the backdoor methods (bypassing the monitor) it suffices to do so from a class added to one of the TCB packages Even though the usage of aspect oriented programming technologies allows the separation of concerns, understanding the run time application behavior might end up being quite complicated, especially when policies become complex. Furthermore, the use of this technologies might induce endless loops or behaviors that are not feasible when the non-monitored application is executed, as presented below. 9. The Polymer class loader might create multiple instances of a given class, which cripples the target application whenever it uses comparisons based on Class objects. For instance, an execution trace such as the one below which works when the application is executed in standalone mode, throws an exception when executed inside Polymer: Subject s = new Subject ( ) ; PasswordPrincipal p = new PasswordPrincipal ( " test@cs. ru. nl" ) ; s. add ( p ) ; (... ) if ( s. getprincipals ( MyPrincipal. class ). length()==0) Throw new PolymerCrippledTheApplication ( ) ; System. out. println ( "ok" ) ; In the context of this project, comparing JAAS and Polymer from a functional point of view is not possible given that they were used for different purposes, namely, authentication and authorization. Therefore, rather than comparing them using that criterion, we decided to base our comparison on some other aspects as shown below: Both are flexible, extensible, and reusable. Usability: Polymer was found to be much more difficult to use than JAAS. In fact, JAAS is well documented and requires a short learning curve, while Polymer was found to be quite complicated to use, poorly documented and has a long learning curve. Design: Both the design of Polymer and JAAS are quite nice. Although Polymer requires some special setup (link to the three requirements of polymer stated in the assumptions section). Security: We were able to bypass Polymer and not able to bypass JAAS. 4 see javax.evil.sendmailevil, a class that we created which bypasses the Polymer monitor using this trick. In order to execute the hack, compile the application as specified in the README file and execute the javax.evil.sendmailevil class instead of ss.sendmailcli (or use the runevil script) 6
7 5 Conclusion We found securing software by means of authentication and authorization an interesting experience. We all had experience on breaking into software (Hacker s hut course) and writing secure code (from the same course), but we lacked hands-on experience on securing software by using authentication and authorisation provided by specialized tools and APIs. We were rather disappointed and frustrated by the unreasonable amount of time taken to configure and get Polymer working, which was exacerbated by the fact that writing Polymer code took much less time than configuring the tool. When it comes down to comparing Polymer and JAAS, for the reasons discussed at the end of the Section 4, we can say that our overall experience with JAAS was much better than with Polymer. On the other hand, we understand that Polymer -unlike JAAS, which is a mainstream part of the standard JDK- is a research tool, which still has several issues that need to be resolved (such as the hack we discovered) and smoothed before being usable outside the software security research community. References [1] S. M. Inc. (2007, May) Java authentication and authorization service (jaas). [Online]. Available: [2] L. Bauer, J. Ligatti, and D. Walker, Composing security policies with Polymer, in Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), Jun. 2005, pp [Online]. Available: lbauer/papers/polymer-pldi05.pdf [3] S. M. Inc. (2007, May) Javamail api. [Online]. Available: [4] L. Bauer, J. Ligatti, and D. Walker. (2007, May) Polymer: Software monitoring in theory and practice. [Online]. Available: [5] S. M. Inc. (2007, May) Jaas authentication. [Online]. Available: guide/security/jgss/tutorials/acnonly.html [6] F. Piessens and T. Verhanneman. (2007, May) Practicum ontwerpen van veilige software (ovs) [Online]. Available: tine/ovs/index.htm 7
Checking Access to Protected Members in the Java Virtual Machine
Checking Access to Protected Members in the Java Virtual Machine Alessandro Coglio Kestrel Institute 3260 Hillview Avenue, Palo Alto, CA 94304, USA Ph. +1-650-493-6871 Fax +1-650-424-1807 http://www.kestrel.edu/
Secure Authentication and Session. State Management for Web Services
Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young Lehman 1 1. Introduction Web services are a relatively
Efficient database auditing
Topicus Fincare Efficient database auditing And entity reversion Dennis Windhouwer Supervised by: Pim van den Broek, Jasper Laagland and Johan te Winkel 9 April 2014 SUMMARY Topicus wants their current
The Security Framework 4.1 Programming and Design
Tel: (301) 587-3000 Fax: (301) 587-7877 E-mail: [email protected] Web: www.setecs.com Security Architecture for Development and Run Time Support of Secure Network Applications Sead Muftic, President/CEO
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
000-420. IBM InfoSphere MDM Server v9.0. Version: Demo. Page <<1/11>>
000-420 IBM InfoSphere MDM Server v9.0 Version: Demo Page 1. As part of a maintenance team for an InfoSphere MDM Server implementation, you are investigating the "EndDate must be after StartDate"
Using jlock s Java Authentication and Authorization Service (JAAS) for Application-Level Security
Using jlock s Java Authentication and Authorization Service (JAAS) for Application-Level Security Introduction Updated January 2006 www.2ab.com Access management is a simple concept. Every business has
Designing and Coding Secure Systems
Designing and Coding Secure Systems Kenneth Ingham and Anil Somayaji September 29, 2009 1 Course overview This class covers secure coding and some design issues from a language neutral approach you can
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de
Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
HTTP connections can use transport-layer security (SSL or its successor, TLS) to provide data integrity
Improving File Sharing Security: A Standards Based Approach A Xythos Software White Paper January 2, 2003 Abstract Increasing threats to enterprise networks coupled with an ever-growing dependence upon
90% of data breaches are caused by software vulnerabilities.
90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with
GenericServ, a Generic Server for Web Application Development
EurAsia-ICT 2002, Shiraz-Iran, 29-31 Oct. GenericServ, a Generic Server for Web Application Development Samar TAWBI PHD student [email protected] Bilal CHEBARO Assistant professor [email protected] Abstract
HGC SUPERHUB HOSTED EXCHANGE EMAIL
HGC SUPERHUB HOSTED EXCHANGE EMAIL OUTLOOK 2010 POP3 SETUP GUIDE MICROSOFT HOSTED COMMUNICATION SERVICE V2013.5 Table of Contents 1. Get Started... 1 1.1 Start from Setting up an Email account... 1 1.2
Project #4: MITM Attacks and Authentication
Project #4: MITM Attacks and Authentication CS 645: Network Security Due: August 31, 2012 11:59 pm EST August 15, 2013 This project is based on a project designed by Dan Boneh for his class (cs 255) and
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
Last Updated: July 2011. STATISTICA Enterprise Server Security
Last Updated: July 2011 STATISTICA Enterprise Server Security STATISTICA Enterprise Server Security Page 2 of 10 Table of Contents Executive Summary... 3 Introduction to STATISTICA Enterprise Server...
High Level Design Distributed Network Traffic Controller
High Level Design Distributed Network Traffic Controller Revision Number: 1.0 Last date of revision: 2/2/05 22c:198 Johnson, Chadwick Hugh Change Record Revision Date Author Changes 1 Contents 1. Introduction
End User Guide The guide for email/ftp account owner
End User Guide The guide for email/ftp account owner ServerDirector Version 3.7 Table Of Contents Introduction...1 Logging In...1 Logging Out...3 Installing SSL License...3 System Requirements...4 Navigating...4
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
labs Attacking JAVA Serialized Communication By: Manish S. Saindane
ATTACK & DEFENSE labs Attacking JAVA Serialized Communication By: Manish S. Saindane Black Hat Europe 2010 2 Introduction Many applications written in JAVA make use of Object Serialization to transfer
Web Authentication Application Note
What is Web Authentication? Web Authentication Application Note Web authentication is a Layer 3 security feature that causes the router to not allow IP traffic (except DHCP-related packets) from a particular
Multi Factor Authentication API
GEORGIA INSTITUTE OF TECHNOLOGY Multi Factor Authentication API Yusuf Nadir Saghar Amay Singhal CONTENTS Abstract... 3 Motivation... 3 Overall Design:... 4 MFA Architecture... 5 Authentication Workflow...
Using Foundstone CookieDigger to Analyze Web Session Management
Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.
Copyright 2013 Consona Corporation. All rights reserved www.compiere.com
COMPIERE 3.8.1 SOAP FRAMEWORK Copyright 2013 Consona Corporation. All rights reserved www.compiere.com Table of Contents Compiere SOAP API... 3 Accessing Compiere SOAP... 3 Generate Java Compiere SOAP
Novell Access Manager
J2EE Agent Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP3 February 02, 2011 www.novell.com Novell Access Manager 3.1 SP3 J2EE Agent Guide Legal Notices Novell, Inc., makes no representations
XGENPLUS SECURITY FEATURES...
Security Features Table of Contents TABLE OF CONTENTS... 2 1. INTRODUCTION... 3 2. XGENPLUS SECURITY FEATURES... 3 3. SERVER LEVEL FEATURES... 5 4. DOMAIN LEVEL FEATURES... 8 5. USER LEVEL FEATURES...
VOL. 2, NO. 1, January 2012 ISSN 2225-7217 ARPN Journal of Science and Technology 2010-2012 ARPN Journals. All rights reserved
Mobile Application for News and Interactive Services L. Ashwin Kumar Department of Information Technology, JNTU, Hyderabad, India [email protected] ABSTRACT In this paper, we describe the design and
Stateful Inspection Technology
Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions
1. Open the preferences screen by opening the Mail menu and selecting Preferences...
Using TLS encryption with OS X Mail This guide assumes that you have already created an account in Mail. If you have not, you can use the new account wizard. The new account wizard is in the Accounts window
High Security Online Backup. A Cyphertite White Paper February, 2013. Cloud-Based Backup Storage Threat Models
A Cyphertite White Paper February, 2013 Cloud-Based Backup Storage Threat Models PG. 1 Definition of Terms Secrets Passphrase: The secrets passphrase is the passphrase used to decrypt the 2 encrypted 256-bit
In: Proceedings of RECPAD 2002-12th Portuguese Conference on Pattern Recognition June 27th- 28th, 2002 Aveiro, Portugal
Paper Title: Generic Framework for Video Analysis Authors: Luís Filipe Tavares INESC Porto [email protected] Luís Teixeira INESC Porto, Universidade Católica Portuguesa [email protected] Luís Corte-Real
Acano solution. Security Considerations. August 2015 76-1026-01-E
Acano solution Security Considerations August 2015 76-1026-01-E Contents Contents 1 Introduction... 3 2 Acano Secure Development Lifecycle... 3 3 Acano Security Points... 4 Acano solution: Security Consideration
Email Update Instructions
1 Email Update Instructions Contents Email Client Settings The Basics... 3 Outlook 2013... 4 Outlook 2007... 6 Outlook Express... 7 Windows Mail... 8 Thunderbird 3... 9 Apple Mail... 10 2 Email Client
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
How to Build an Effective Mail Server Defense
How to Build an Effective Mail Server Defense A multi-stage approach to securing your email communication August, 21 2006 Author: Alin Dobre, Head of Customer Support, AXIGEN GECAD Technologies 10A Dimitrie
ORACLE DATABASE SECURITY. Keywords: data security, password administration, Oracle HTTP Server, OracleAS, access control.
ORACLE DATABASE SECURITY Cristina-Maria Titrade 1 Abstract This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
APPLETS AND NETWORK SECURITY: A MANAGEMENT OVERVIEW
84-10-25 DATA SECURITY MANAGEMENT APPLETS AND NETWORK SECURITY: A MANAGEMENT OVERVIEW Al Berg INSIDE Applets and the Web, The Security Issue, Java: Secure Applets, Java: Holes and Bugs, Denial-of-Service
Internet Mail Client Control Library SSL Supplement
Codestone Ltd Internet Mail Client Control Library SSL Supplement Codestone Ltd 2004 Page 1 / 22 Welcome to the Internet Mail Client Control Library SSL Supplement we hope you will find the library to
Exam Name: IBM InfoSphere MDM Server v9.0
Vendor: IBM Exam Code: 000-420 Exam Name: IBM InfoSphere MDM Server v9.0 Version: DEMO 1. As part of a maintenance team for an InfoSphere MDM Server implementation, you are investigating the "EndDate must
Oracle Database Security and Audit
Copyright 2014, Oracle Database Security and Audit Beyond Checklists Learning objectives Understand Oracle architecture Database Listener Oracle connection handshake Client/server architecture Authentication
Enhanced Model of SQL Injection Detecting and Prevention
Enhanced Model of SQL Injection Detecting and Prevention Srinivas Baggam, Assistant Professor, Department of Computer Science and Engineering, MVGR College of Engineering, Vizianagaram, India. [email protected]
Secure Mail Registration and Viewing Procedures
Secure Mail Registration and Viewing Procedures May 2011 For External Secure Mail Recipients Contents This document provides a brief, end user oriented overview of the Associated Banc Corp s Secure Email
Hong Kong Baptist University
Hong Kong Baptist University Guidelines for Development and Maintenance of University/Departmental Websites FOR INTERNAL USE ONLY Date of Issue: MAY 2014 Revision History Version Author Date Revision 1.0
CHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION 1.1 Introduction Cloud computing as a new paradigm of information technology that offers tremendous advantages in economic aspects such as reduced time to market, flexible computing
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
Security in Android apps
Security in Android apps Falco Peijnenburg (3749002) August 16, 2013 Abstract Apps can be released on the Google Play store through the Google Developer Console. The Google Play store only allows apps
Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
How To Secure Cloud Computing
Resilient Cloud Services By Hemayamini Kurra, Glynis Dsouza, Youssif Al Nasshif, Salim Hariri University of Arizona First Franco-American Workshop on Cybersecurity 18 th October, 2013 Presentation Outline
MS Enterprise Library 5.0 (Logging Application Block)
International Journal of Scientific and Research Publications, Volume 4, Issue 8, August 2014 1 MS Enterprise Library 5.0 (Logging Application Block) Anubhav Tiwari * R&D Dept., Syscom Corporation Ltd.
Email Update Instructions
Email Update Instructions Table of Contents Email Client Settings The Basics... 2 Outlook 2013... 2 Outlook 2007... 4 Outlook Express... 6 Windows Mail... 7 Thunderbird 3... 9 Apple Mail... 11 1 Email
IP Monitoring and Filtering
IP Monitoring and Filtering By Gnanambal Chithambaram Sandeep Dubey Smrithi Barrenkula Subraja Krishnamurthy Sucheta P Kodali Abstract In our project IP Monitoring and filtering we developed a Java application
Oracle WebLogic Server 11g Administration
Oracle WebLogic Server 11g Administration This course is designed to provide instruction and hands-on practice in installing and configuring Oracle WebLogic Server 11g. These tasks include starting and
Authorize.net modules for oscommerce Online Merchant.
Authorize.net Authorize.net modules for oscommerce Online Merchant. Chapters oscommerce Online Merchant v2.3 Copyright Copyright (c) 2014 oscommerce. All rights reserved. Content may be reproduced for
WHITE PAPER AUGUST 2014. Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords
WHITE PAPER AUGUST 2014 Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords 2 WHITE PAPER: PREVENTING SECURITY BREACHES Table of Contents on t Become the Next Headline
Cisco Trust Anchor Technologies
Data Sheet Cisco Trust Anchor Technologies Overview Cisco Trust Anchor Technologies provide the foundation for trustworthy systems across Cisco. The Cisco Trust Anchor and a Secure Boot check of signed
CHAPTER 1 - JAVA EE OVERVIEW FOR ADMINISTRATORS
CHAPTER 1 - JAVA EE OVERVIEW FOR ADMINISTRATORS Java EE Components Java EE Vendor Specifications Containers Java EE Blueprint Services JDBC Data Sources Java Naming and Directory Interface Java Message
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
Final Year Project Interim Report
2013 Final Year Project Interim Report FYP12016 AirCrypt The Secure File Sharing Platform for Everyone Supervisors: Dr. L.C.K. Hui Dr. H.Y. Chung Students: Fong Chun Sing (2010170994) Leung Sui Lun (2010580058)
Analysis of SQL injection prevention using a proxy server
Computer Science Honours 2005 Project Proposal Analysis of SQL injection prevention using a proxy server By David Rowe Supervisor: Barry Irwin Department of Computer
RAYSAFE S1 SECURITY WHITEPAPER VERSION B. RaySafe S1 SECURITY WHITEPAPER
RaySafe S1 SECURITY WHITEPAPER Contents 1. INTRODUCTION 2 ARCHITECTURE OVERVIEW 2.1 Structure 3 SECURITY ASPECTS 3.1 Security Aspects for RaySafe S1 Data Collector 3.2 Security Aspects for RaySafe S1 cloud-based
Digital signature in insecure environments
Digital signature in insecure environments Janne Varjus Helsinki University of Technology [email protected] Abstract Due to current legislation the digital signatures can be as valid as the hand written
A Pluggable Security Framework for Message Oriented Middleware
A Pluggable Security Framework for Message Oriented Middleware RUEY-SHYANG WU, SHYAN-MING YUAN Department of Computer Science National Chiao-Tung University 1001 Ta Hsueh Road, Hsinchu 300, TAIWAN, R.
Security Evaluation CLX.Sentinel
Security Evaluation CLX.Sentinel October 15th, 2009 Walter Sprenger [email protected] Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil Tel.+41 55-214 41 60 Fax+41 55-214 41
Media Shuttle s Defense-in- Depth Security Strategy
Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among
Web Presentation Layer Architecture
Chapter 4 Web Presentation Layer Architecture In this chapter we provide a discussion of important current approaches to web interface programming based on the Model 2 architecture [59]. From the results
Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery
Overview Password Manager Pro offers a complete solution to control, manage, monitor and audit the entire life-cycle of privileged access. In a single package it offers three solutions - privileged account
Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process
Complete Web Application Security Phase1-Building Web Application Security into Your Development Process Table of Contents Introduction 3 Thinking of security as a process 4 The Development Life Cycle
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
PASS4TEST 専 門 IT 認 証 試 験 問 題 集 提 供 者
PASS4TEST 専 門 IT 認 証 試 験 問 題 集 提 供 者 http://www.pass4test.jp 1 年 で 無 料 進 級 することに 提 供 する Exam : C2090-420 Title : IBM InfoSphere MDM Server v9.0 Vendors : IBM Version : DEMO NO.1 Which two reasons would
An Innovative Two Factor Authentication Method: The QRLogin System
An Innovative Two Factor Authentication Method: The QRLogin System Soonduck Yoo*, Seung-jung Shin and Dae-hyun Ryu Dept. of IT, University of Hansei, 604-5 Dangjung-dong Gunpo city, Gyeonggi do, Korea,
Enterprise SSO Manager (E-SSO-M)
Enterprise SSO Manager (E-SSO-M) Many resources, such as internet applications, internal network applications and Operating Systems, require the end user to log in several times before they are empowered
026-1010 Rev 7 06-OCT-2011. Site Manager Installation Guide
026-1010 Rev 7 06-OCT-2011 Site Manager Installation Guide Retail Solutions 3240 Town Point Drive NW, Suite 100 Kennesaw, GA 30144, USA Phone: 770-425-2724 Fax: 770-425-9319 Table of Contents 1 SERVER
The Value of Physical Memory for Incident Response
The Value of Physical Memory for Incident Response MCSI 3604 Fair Oaks Blvd Suite 250 Sacramento, CA 95864 www.mcsi.mantech.com 2003-2015 ManTech Cyber Solutions International, All Rights Reserved. Physical
20.12. smtplib SMTP protocol client
20.12. smtplib SMTP protocol client The smtplib module defines an SMTP client session object that can be used to send mail to any Internet machine with an SMTP or ESMTP listener daemon. For details of
ITDUMPS QUESTION & ANSWER. Accurate study guides, High passing rate! IT dumps provides update free of charge in one year!
ITDUMPS QUESTION & ANSWER Accurate study guides, High passing rate! IT dumps provides update free of charge in one year! HTTP://WWW.ITDUMPS.COM Exam : 70-549(C++) Title : PRO:Design & Develop Enterprise
CrashPlan Security SECURITY CONTEXT TECHNOLOGY
TECHNICAL SPECIFICATIONS CrashPlan Security CrashPlan is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops
WebSphere Training Outline
WEBSPHERE TRAINING WebSphere Training Outline WebSphere Platform Overview o WebSphere Product Categories o WebSphere Development, Presentation, Integration and Deployment Tools o WebSphere Application
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler [email protected] Mentor: Professor Chris Gregg Abstract Modern day authentication systems
Using weblock s Servlet Filters for Application-Level Security
Using weblock s Servlet Filters for Application-Level Security September 2006 www.2ab.com Introduction Access management is a simple concept. Every business has information that needs to be protected from
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
83-10-41 Types of Firewalls E. Eugene Schultz Payoff
83-10-41 Types of Firewalls E. Eugene Schultz Payoff Firewalls are an excellent security mechanism to protect networks from intruders, and they can establish a relatively secure barrier between a system
JAVA 2 Network Security
JAVA 2 Network Security M A R C O PISTOIA DUANE F. RELLER DEEPAK GUPTA MILIND NAGNUR ASHOK K. RAMANI PTR, UPPER http://www.phptr.com PRENTICE HALL SADDLE RIVER, NEW JERSEY 07458 Contents Foreword Preface
Email Update Instructions
1 Email Update Instructions Contents Email Client Settings The Basics... 3 Outlook 2013... 4 Outlook 2007... 6 Outlook Express... 8 Windows Mail... 9 Thunderbird 3... 10 Apple Mail... 11 2 Email Client
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT Chandramohan Muniraman, University of Houston-Victoria, [email protected] Meledath Damodaran, University of Houston-Victoria, [email protected]
Why you need secure email
Why you need secure email WHITE PAPER CONTENTS 1. Executive summary 2. How email works 3. Security threats to your email communications 4. Symmetric and asymmetric encryption 5. Securing your email with
HACKING AUTHENTICATION CHECKS IN WEB APPLICATIONS ASHISH RAO & SIDDHARTH ANBALAHAN
HACKING AUTHENTICATION CHECKS IN WEB APPLICATIONS ASHISH RAO & SIDDHARTH ANBALAHAN About Ashish 4 years of IT Security Experience Security Consultant and Researcher Application and Code Security Practice
IUCLID 5 Guidance and support. Installation Guide Distributed Version. Linux - Apache Tomcat - PostgreSQL
IUCLID 5 Guidance and support Installation Guide Distributed Version Linux - Apache Tomcat - PostgreSQL June 2009 Legal Notice Neither the European Chemicals Agency nor any person acting on behalf of the
