Model-based analysis of Java EE web security misconfigurations - CEA - Commissariat à l’énergie atomique et aux énergies alternatives Accéder directement au contenu
Article Dans Une Revue Computer Languages, Systems and Structures Année : 2017

Model-based analysis of Java EE web security misconfigurations

Résumé

The Java EE framework, a popular technology of choice for the development of web applications, provides developers with the means to define access-control policies to protect application resources from unauthorized disclosures and manipulations. Unfortunately, the definition and manipulation of such security policies remains a complex and error prone task, requiring expert-level knowledge on the syntax and semantics of the Java EE access-control mechanisms. Thus, misconfigurations that may lead to unintentional security and/or availability problems can be easily introduced. In response to this problem, we Present a (model-based) reverse engineering approach that automatically evaluates a set of security properties on reverse engineered Java EE security configurations, helping to detect the presence of anomalies. We evaluate the efficacy and pertinence of our approach by applying our prototype tool on a sample of real Java EE applications extracted from GitHub.
Fichier principal
Vignette du fichier
Martinez2017.pdf (374.52 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

cea-01803832 , version 1 (14-01-2019)

Identifiants

Citer

Salvador Martínez, Valerio Cosentino, Jordi Cabot. Model-based analysis of Java EE web security misconfigurations. Computer Languages, Systems and Structures, 2017, 49 (SI), pp.36-61. ⟨10.1016/j.cl.2017.02.001⟩. ⟨cea-01803832⟩
192 Consultations
463 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More