Java Components Vulnerabilities - An Experimental Classification Targeted at the OSGi Platform

Reading time: 7 minute
...

📝 Original Info

  • Title: Java Components Vulnerabilities - An Experimental Classification Targeted at the OSGi Platform
  • ArXiv ID: 0706.3812
  • Date: 2011-11-10
  • Authors: Researchers from original ArXiv paper

📝 Abstract

The OSGi Platform finds a growing interest in two different applications domains: embedded systems, and applications servers. However, the security properties of this platform are hardly studied, which is likely to hinder its use in production systems. This is all the more important that the dynamic aspect of OSGi-based applications, that can be extended at runtime, make them vulnerable to malicious code injection. We therefore perform a systematic audit of the OSGi platform so as to build a vulnerability catalog that intends to reference OSGi Vulnerabilities originating in the Core Specification, and in behaviors related to the use of the Java language. Standard Services are not considered. To support this audit, a Semi-formal Vulnerability Pattern is defined, that enables to uniquely characterize fundamental properties for each vulnerability, to include verbose description in the pattern, to reference known security protections, and to track the implementation status of the proof-of-concept OSGi Bundles that exploit the vulnerability. Based on the analysis of the catalog, a robust OSGi Platform is built, and recommendations are made to enhance the OSGi Specifications.

💡 Deep Analysis

Deep Dive into Java Components Vulnerabilities - An Experimental Classification Targeted at the OSGi Platform.

The OSGi Platform finds a growing interest in two different applications domains: embedded systems, and applications servers. However, the security properties of this platform are hardly studied, which is likely to hinder its use in production systems. This is all the more important that the dynamic aspect of OSGi-based applications, that can be extended at runtime, make them vulnerable to malicious code injection. We therefore perform a systematic audit of the OSGi platform so as to build a vulnerability catalog that intends to reference OSGi Vulnerabilities originating in the Core Specification, and in behaviors related to the use of the Java language. Standard Services are not considered. To support this audit, a Semi-formal Vulnerability Pattern is defined, that enables to uniquely characterize fundamental properties for each vulnerability, to include verbose description in the pattern, to reference known security protections, and to track the implementation status of the proof-of-

📄 Full Content

arXiv:0706.3812v3 [cs.CR] 27 Jul 2007 apport

de recherche ISSN 0249-6399 ISRN INRIA/RR–6231–FR+ENG Thème COM INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET EN AUTOMATIQUE Java Components Vulnerabilities

An Experimental Classification Targeted at the OSGi Platform Pierre Parrend — Stéphane Frénot N° 6231 June 2007 Unité de recherche INRIA Rhône-Alpes 655, avenue de l’Europe, 38334 Montbonnot Saint Ismier (France) Téléphone : +33 4 76 61 52 00 — Télécopie +33 4 76 61 52 52 Ja v a Comp onen ts V ulnerabilities

An Exp erimen tal Classi ation T argeted at the OSGi Platform ∗ Pierre P arrend, Stéphane F rénot Thème COM  Systèmes omm uni an ts Pro jet ARES Rapp ort de re her he n° 6231  June 2007  84 pages Abstra t: The OSGi Platform nds a gro wing in terest in t w o dieren t appli ations domains: em b edded systems, and appli ations serv ers. Ho w ev er, the se urit y prop erties of this platform are hardly studied, whi h is lik ely to hinder its use in pro du tion systems. This is all the more imp ortan t that the dynami asp e t of OSGi-based appli ations, that an b e extended at run time, mak e them vulnerable to mali ious o de inje tion. W e therefore p erform a systemati audit of the OSGi platform so as to build a vul- nerabilit y atalog that in tends to referen e OSGi V ulnerabilities originating in the Core Sp e i ation, and in b eha viors related to the use of the Ja v a language. Implemen tation of Standard Servi es are not onsidered. T o supp ort this audit, a Semi-formal V ulnerabilit y P attern is dened, that enables to uniquely

hara terize fundamen tal prop erties for ea h vulnerabilit y , to in lude v erb ose de- s ription in the pattern, to referen e kno wn se urit y prote tions, and to tra k the imple- men tation status of the pro of-of- on ept OSGi Bundles that exploit the vulnerabilit y . Based on the analysis of the atalog, a robust OSGi Platform is built, and re ommenda- tions are made to enhan e the OSGi Sp e i ations. Key-w ords: OSGitm Platform, Se urit y , Dep endabilit y , Ja v a, Hardened Exe ution Plat- form, V ulnerabilit y Catalog ∗ This W ork is partialy founded b y Muse IST Pro je t n°026442. V ulnerabilités des Comp osan ts Ja v a

Une Classi ation Exp érimen tale Dans le Cadre de la Plate-forme OSGi Résumé : La plate-forme d’exé ution OSGi ren on tre un in térêt grandissan t dans deux domaines d’appli ations diéren ts: les systèmes em barqués, et les serv eurs d’appli ations. Cep endan t, les propriétés de ette plate-forme relativ es à la sé urité ne son t que très p eu étudiées, e qui p eut fortemen t freiner son adoption dans les systèmes industriels. Ce i est d’autan t plus ritique que la p ossibilité d’extension dynamique à l’exé ution oerte par la plate-forme OSGi rend elle- i vulnérable à l’inje tion de o de mali ieux. Nous ee tuons un audit de l’en vironnemen t d’exé ution OSGi, an de réer un atalogue de vulnérabilités. Nous

her hons à référen er les vulnérabilités ausées par la sp é i ation `Core’, ou bien par la ma hine virtuelle Ja v a sous-ja en te. Les autres élémen ts dénis par OSGi, omme les servi es standards, ne son t pas onsidérés. An de mener à bien et audit, nous dénissons un P attern de V ulnérabilité semi-formel, qui p ermet de dé rire les ara téristiques des vulnérabilités de manière unique, de donner des informations omplémen taires, de référen er les prote tions existan tes, et d’iden tier le status de l’implémen tation des Bundles OSGi de test qui démon tren t

haque vulnérabilité. A partir de ette analyse, un plate-forme OSGi robuste est onstruite, et des re omman- dations p our les sp é i ations OSGi son t données. Mots- lés : Plate-forme OSGitm , Sé urité, Ja v a, Plate-forme d’exé ution renfor ée, Ca- talogue de V ulnérabilités OSGi V ulner abilities 3 Con ten ts 1 In tro du tion 8 2 Chara terization of V ulnerabilities in Comp onen t-based Systems 10 2.1 Denitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.2 F rom Databases to T op-V ulnerabilit y Lists . . . . . . . . . . . . . . . . . . . . 10 2.3 V ulnerabilit y P atterns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 3 The Semi-formal Soft w are V ulnerabilit y P attern 15 3.1 The Stru ture of the Semi-formal V ulnerabilit y P attern . . . . . . . . . . . . 16 3.2 V ulnerabilit y T axonomies for OSGi-based Systems . . . . . . . . . . . . . . . 17 3.3 A V ulnerabilit y Example: `Managemen t Utilit y F reezing

Innite Lo op' . . . 21 4 Requiremen ts for se ure OSGi Systems 24 4.1 Catalog Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 4.2 Requiremen ts for a Hardened OSGi Platform . . . . . . . . . . . . . . . . . . 27 4.3 Re ommendations for a Hardened Exe ution En vironmen t . . . . . . . . . . . 30 5 Con lusions 33 A The OSGi platform 37 A.1 Ov erview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 A.2 The B

…(Full text truncated)…

📸 Image Gallery

cover.png

Reference

This content is AI-processed based on ArXiv data.

Start searching

Enter keywords to search articles

↑↓
ESC
⌘K Shortcut