Autor/a

Martínez Pérez, Salvador

Cosentino, Valerio

Cabot Sagrera, Jordi

Altres autors/es

AtlanMod

Universitat Oberta de Catalunya (UOC)

Data de publicació

2019-04-11T07:53:56Z

2019-04-11T07:53:56Z

2017-09-01



Resum

The Java EE framework, a popular technology of choice for the development of web applications, provides developers with the means to define access-control policies to protect application resources from unauthorized disclosures and manipulations. Unfortunately, the definition and manipulation of such security policies remains a complex and error prone task, requiring expert-level knowledge on the syntax and semantics of the Java EE access-control mechanisms. Thus, misconfigurations that may lead to unintentional security and/or availability problems can be easily introduced. In response to this problem, we present a (model-based) reverse engineering approach that automatically evaluates a set of security properties on reverse engineered Java EE security configurations, helping to detect the presence of anomalies. We evaluate the efficacy and pertinence of our approach by applying our prototype tool on a sample of real Java EE applications extracted from GitHub.

Tipus de document

Article
Versió presentada

Llengua

Anglès

Matèries i paraules clau

reverse engineering; model driven engineering; security; ingeniería dirigida por modelos; seguridad; ingeniería inversa; enginyeria dirigida per models; seguretat; enginyeria inversa; Web applications; Aplicacions web; Aplicaciones web

Publicat per

Computer Languages, Systems and Structures

Documents relacionats

Computer Languages, Systems and Structures, 2017, 49()

https://hal-cea.archives-ouvertes.fr/cea-01803832/file/Martinez2017.pdf

Drets

(c) Author/s & (c) Journal

Aquest element apareix en la col·lecció o col·leccions següent(s)

Articles [361]