Title :
Extracting and Analyzing the Implemented Security Architecture of Business Applications
Author :
Berger, B.J. ; Sohr, Karsten ; Koschke, Rainer
Author_Institution :
Center for Comput. Technol. (TZI), Univ. Bremen, Bremen, Germany
Abstract :
Security is getting more and more important for the software development process as the advent of more complex, connected and extensible software entails new risks. In particular, multi-tier business applications, e.g., based on the Service-Oriented Architecture (SOA), are vulnerable to new attacks, which may endanger the business processes of an organization. These applications consist often of legacy code, which is now exported via Web Services, although it has originally been developed for internal use only. The last years showed great progress in the area of static code analysis for the detection of common low level security bugs, such as buffer overflows and cross-site scripting vulnerabilities. However, there is still a lack of tools that allow an analyst to assess the implemented security architecture of an application. In this paper, we propose a technique that automatically extracts the implemented security architecture of Java-based business applications from the source code. In addition, we carry out threat modeling on this extracted architecture to detect security flaws. We evaluate and discuss our approach with the help of two commercial real-world case studies, one taken from the e-government domain and the other one from logistics.
Keywords :
Java; business data processing; program debugging; program diagnostics; security of data; service-oriented architecture; software maintenance; Java-based business application; SOA; Web service; buffer overflow; cross-site scripting vulnerability; e-government domain; legacy code; logistics; multitier business application; security architecture; security bug detection; security flaw detection; service-oriented architecture; software development process; source code; static code analysis; threat modeling; Analytical models; Computer architecture; Containers; Encryption; Software; Unified modeling language; reverse engineering; software security; static analysis; threat modeling;
Conference_Titel :
Software Maintenance and Reengineering (CSMR), 2013 17th European Conference on
Conference_Location :
Genova
Print_ISBN :
978-1-4673-5833-0
DOI :
10.1109/CSMR.2013.37