• DocumentCode
    3481685
  • Title

    Security Monitoring of Components Using Aspects and Contracts in Wrappers

  • Author

    Yang, Xiaofeng ; Zulkernine, Mohammad

  • Author_Institution
    Sch. of Comput., Queen´´s Univ., Kingston, ON, Canada
  • fYear
    2011
  • fDate
    18-22 July 2011
  • Firstpage
    566
  • Lastpage
    575
  • Abstract
    The re-usability and modularity of components reduce the cost and complexity of the software design. It is difficult to predict run-time scenarios covering all possible circumstances to ensure that the components are fully compatible with the system. Given that, monitoring run-time behaviours of components presents a close view of the component qualities. The existing monitoring approaches either implement applications with built-in monitoring features, or observe the external resources and events to predict the status of the components. In this paper, we propose an approach to monitor the runtime behaviours of components using aspect-oriented wrappers and contracts. We design monitoring wrappers to encapsulate the monitored components. We use contracts to define the mutual obligations of two interacting components. The policies implemented in contracts are woven into component wrappers as separate aspect modules. If the component contains any flaws or vulnerabilities, the wrappers can monitor some behaviours and prevent failures propagating into the wrapped components and the rest of the system. This approach assures that the system is running in a safe environment with the erroneous behaviours detected appropriately. We conducted experiments on the run-time monitoring of SQL Injection, Cross Site Scripting attacks, and access control policies. The results show that the framework is very flexible to impose separate policies as aspects on component wrappers without the modifications of the underlying components.
  • Keywords
    SQL; aspect-oriented programming; authorisation; contracts; cost reduction; software reusability; system monitoring; SQL injection; access control policies; aspect-oriented wrappers; component modularity; component re-usability; component security monitoring; cost reduction; cross site scripting attacks; failures; flaws; run-time behaviours; software design; vulnerabilities; Context; Contracts; Instruments; Monitoring; Security; Servers; Weaving; Aspects; Components; Contracts; Security Monitoring; Wrappers;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Software and Applications Conference (COMPSAC), 2011 IEEE 35th Annual
  • Conference_Location
    Munich
  • ISSN
    0730-3157
  • Print_ISBN
    978-1-4577-0544-1
  • Electronic_ISBN
    0730-3157
  • Type

    conf

  • DOI
    10.1109/COMPSAC.2011.79
  • Filename
    6032399