Главная
Study mode:
on
1
Introduction
2
Joint Work
3
Java Security Model
4
Information Checks
5
Model Deviation
6
Example
7
Permission Check
8
Shortcut
9
Consequences
10
Shortcuts prevent
11
Shortcut example
12
System class example
13
Sample exploits
14
Moving from Implicit to Explicit
15
Removing Conditionals
16
Implementation
17
General Lessons
18
Questions
Description:
Explore a comprehensive analysis of Java's access control vulnerabilities in this IEEE Symposium on Security & Privacy conference talk. Delve into the study of shortcuts that bypass stack-based access control, leading to implicit privilege elevation and potential security risks. Examine the consequences of these shortcuts, including their impact on software maintenance and the introduction of confused-deputy vulnerabilities. Learn about a proposed solution involving a tool-assisted adaptation of the Java Class Library to implement explicit privilege elevation. Discover how these changes can significantly enhance the security of Java applications by hindering new vulnerabilities and restricting attacker capabilities. Gain insights into usability considerations and performance implications of implementing faithful stack-based access control in Java.

Hardening Java's Access Control by Abolishing Implicit Privilege Elevation

IEEE
Add to list
0:00 / 0:00