2004
DOI: 10.1007/978-3-540-24848-4_12
|View full text |Cite
|
Sign up to set email alerts
|

Secure Deployment of Components

Abstract: Abstract. The secure deployment of components is widely recognized as a crucial problem in component-based software engineering. While major effort is concentrated on preventing malicious components from penetrating secure systems, other security violations may also cause significant problems. We uncover a technique that creates a major breach of security by allowing rogue components to interfere with component-based applications by impersonating various generic components. This interference leads to stealing … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2005
2005
2022
2022

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…A more robust mechanism for guaranteeing the deployment of component is the S-CODEP (SECure COmponent DEPloyment) protocol [5]. It is based on Kerberos, and provides an anti-replay mechanism.…”
Section: Secure Deploymentmentioning
confidence: 99%
“…A more robust mechanism for guaranteeing the deployment of component is the S-CODEP (SECure COmponent DEPloyment) protocol [5]. It is based on Kerberos, and provides an anti-replay mechanism.…”
Section: Secure Deploymentmentioning
confidence: 99%
“…In [6] a scenario is described in which components impersonate other components. This is not possible in a content-addressable file system with static component composition (e.g., Unix dynamic libraries with RPATHs pointing to the full paths of components to link against, as happens in the Nix Packages collection).…”
Section: Related Workmentioning
confidence: 99%
“…Component-based systems have multiple points of attack. Recently we discovered a variation of the impersonation attack and solution based on Kerberos was offered for component-based systems [6]. We need a protocol that is specific for component-based systems, offers comprehensive protection, and works seamlessly with CASSIA.…”
Section: Rationalementioning
confidence: 99%
“…SCOP is based on the S-CODEP protocol [6] which itself is based on the Kerberos protocol [7] [8]. We prove the soundness of SCOP in a separate technical report [9] using BAN authentication logic [10].…”
Section: Introductionmentioning
confidence: 99%