DocumentCode :
3481685
Title :
Security Monitoring of Components Using Aspects and Contracts in Wrappers
Author :
Yang, Xiaofeng ; Zulkernine, Mohammad
Author_Institution :
Sch. of Comput., Queen´´s Univ., Kingston, ON, Canada
fYear :
2011
fDate :
18-22 July 2011
Firstpage :
566
Lastpage :
575
Abstract :
The re-usability and modularity of components reduce the cost and complexity of the software design. It is difficult to predict run-time scenarios covering all possible circumstances to ensure that the components are fully compatible with the system. Given that, monitoring run-time behaviours of components presents a close view of the component qualities. The existing monitoring approaches either implement applications with built-in monitoring features, or observe the external resources and events to predict the status of the components. In this paper, we propose an approach to monitor the runtime behaviours of components using aspect-oriented wrappers and contracts. We design monitoring wrappers to encapsulate the monitored components. We use contracts to define the mutual obligations of two interacting components. The policies implemented in contracts are woven into component wrappers as separate aspect modules. If the component contains any flaws or vulnerabilities, the wrappers can monitor some behaviours and prevent failures propagating into the wrapped components and the rest of the system. This approach assures that the system is running in a safe environment with the erroneous behaviours detected appropriately. We conducted experiments on the run-time monitoring of SQL Injection, Cross Site Scripting attacks, and access control policies. The results show that the framework is very flexible to impose separate policies as aspects on component wrappers without the modifications of the underlying components.
Keywords :
SQL; aspect-oriented programming; authorisation; contracts; cost reduction; software reusability; system monitoring; SQL injection; access control policies; aspect-oriented wrappers; component modularity; component re-usability; component security monitoring; cost reduction; cross site scripting attacks; failures; flaws; run-time behaviours; software design; vulnerabilities; Context; Contracts; Instruments; Monitoring; Security; Servers; Weaving; Aspects; Components; Contracts; Security Monitoring; Wrappers;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Software and Applications Conference (COMPSAC), 2011 IEEE 35th Annual
Conference_Location :
Munich
ISSN :
0730-3157
Print_ISBN :
978-1-4577-0544-1
Electronic_ISBN :
0730-3157
Type :
conf
DOI :
10.1109/COMPSAC.2011.79
Filename :
6032399
Link To Document :
بازگشت