2013
DOI: 10.1007/978-3-642-36883-7_9
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Configuration Vulnerabilities in Distributed (Web) Environments

Abstract: Many tools and libraries are readily available to build and operate distributed Web applications. While the setup of operational environments is comparatively easy, practice shows that their continuous secure operation is more difficult to achieve, many times resulting in vulnerable systems exposed to the Internet. Authenticated vulnerability scanners and validation tools represent a means to detect security vulnerabilities caused by missing patches or misconfiguration, but current approaches center much aroun… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2013
2013
2015
2015

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…A language-based approach to specify and execute declarative and unambiguous security checks for detecting vulnerabilities caused by a system misconfiguration is proposed in [14]. The proposed language is based on the SCAP specification [30] and extends the OVAL configuration validation standard [31].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…A language-based approach to specify and execute declarative and unambiguous security checks for detecting vulnerabilities caused by a system misconfiguration is proposed in [14]. The proposed language is based on the SCAP specification [30] and extends the OVAL configuration validation standard [31].…”
Section: Related Workmentioning
confidence: 99%
“…In the case when configuration vulnerability is considered, it is mostly limited to the deployment environment [12]- [14]. This is a practical bottleneck because an invulnerable deployment environment does not guarantee an invulnerable application from configuration perspective.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…During operations time, the configuration validation [27] component compares the actual system configuration retrieved from the CMDB or from the device itself, possibly changed outside of the PoSecCo scope, with the generated configuration resulting from the top-down refinement process. Discrepancies between the golden and actual configuration are identified and their relevance analyzed and reported.…”
Section: Application Componentsmentioning
confidence: 99%