skip to main content
10.1145/1509239.1509275acmconferencesArticle/Chapter ViewAbstractPublication PagesmodularityConference Proceedingsconference-collections
research-article

Enforcing security for desktop clients using authority aspects

Published:02 March 2009Publication History

ABSTRACT

Desktop client applications interact with both local and remote resources. This is both a benefit in terms of the rich features desktop clients can provide, but also a security risk. Due to their high connectivity, desktop clients can leave a user's machine vulnerable to viruses, malicious plug-ins, and scripts. Aspect-Oriented Software Development can be used to address security concerns in software in a modular fashion. However, most existing research focuses on the protection of server-side resources. In this paper we introduce an aspect-oriented mechanism, Authority Aspects, to enforce the Principle of Least Privilege on desktop clients. This helps to ensure that legitimate resource access is allowed and illegitimate access is blocked. We present a case study applying our approach on two desktop applications: an RSS feed aggregator and a Web browser.

References

  1. Anonymous. The Lobo Pro ject. http://www.lobobrowser.org/.Google ScholarGoogle Scholar
  2. Anonymous. Sans top-20 2007 security risks. http://www.sans.org/top20/, The SANS Institute, 2007.Google ScholarGoogle Scholar
  3. Anonymous. Java International FAQ. http://java.sun.com/javase/technologies/core/ basic/intl/faq.jsp, 09 2008.Google ScholarGoogle Scholar
  4. A. Charfi and M. Mezini. Using aspects for security engineering of web service compositions. In Proceedings of the IEEE International Conference on Web Services, pages 59--66, Washington, DC, USA, 2005. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. R. Elz and R. Bush. Clarifications to the DNS Specification. http://www.ietf.org/rfc/rfc2181.txt, 07 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. Gao, Y. Deng, H. Yu, X. He, K. Beznosov, and K. Cooper. Applying Aspect-Orientation in Designing Security Systems: A Case Study. In The Sixteenth International Conference on Software Engineering and Knowledge Engineering, 2004.Google ScholarGoogle Scholar
  7. C. B. Haley, R. C. Laney, and B. Nuseibeh. Deriving security requirements from crosscutting threat descriptions. In Proceedings of the 3rd international conference on Aspect-oriented software development, pages 112--121, New York, NY, USA, 2004. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. C. Hawblitzel, C.-C. Chang, G. Czajkowski, D. Hu, and T. von Eicken. Implementing Multiple Protection Domains in Java. In Proceedings of the 1998 USENIX Annual Technical Conference, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. Huang, C. Wang, and L. Zhang. Toward a Reusable and Generic Security Aspect Library. In AOSD Technology for Application-Level Security Workshop, 2004.Google ScholarGoogle Scholar
  10. A. H. Karp. POLA Today Keeps the Virus at Bay. Technical Report HPL-2003-191, HP Laboratories Palo Alto, 2003.Google ScholarGoogle Scholar
  11. G. Kiczales, E. Hilsdale, J. Hugunin, M. Kersten, J. Palm, and W. G. Griswold. An Overview of AspectJ. In Proceedings of the 15th European Conference on Object-Oriented Programming, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. L. Koved, M. Pistoia, and A. Kershenbaum. Access 2002.Google ScholarGoogle Scholar
  13. L. C. Lam and T. cker Chiueh. A general dynamic information flow tracking framework for security applications. In Proceedings of the 22nd Annual Computer Security Applications Conference, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. Mettler and D. Wagner. The Joe-E Language Specification (draft). University of California, June 2006.Google ScholarGoogle Scholar
  15. M. S. Miller and J. S. Shapiro. Paradigm Regained: Abstraction Mechanisms for Access Control. In Asian Computing Conference, 2003.Google ScholarGoogle Scholar
  16. A. Mourad, M.-A. Laverdiére, and M. Debbabi. A High-level Aspect-oriented-based Framework for Software Security Hardening. Information Security Journal: A Global Perspective, 17(2):56--74, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. K. Padayachee and J. Elo. Innovations and Advanced Techniques in Computer and Information Sciences and Engineering, chapter An Aspect-Oriented Model to Monitor Misuse, pages 273--278. Springer Netherlands, 09 2007.Google ScholarGoogle Scholar
  18. B. Pasero. RSSOwl. http://www.rssowl.org/.Google ScholarGoogle Scholar
  19. N. Provos, M. Friedl, and P. Honeyman. Preventing privilege escalation. In Proceedings of the 12th conference on USENIX Security Symposium, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. A. Prunicki and T. Elrad. Aclamate: An aosd security framework for access control. In Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, pages 293--300, Washington, DC, USA, 2006. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. J. H. Saltzer and M. D. Schroeder. The Protection of Information in Computer Systems. In Communications of the ACM, volume 17, 7, 1974.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. M. Stiegler, A. H. Karp, K.-P. Yee, and M. S. Miller. Polaris: Virus Safe Computing for Windows XP. Technical Report HP:-2004-221, HP Laboratories Palo Alto, 2004.Google ScholarGoogle Scholar
  23. D. Wagner. Ob ject Capabilities for Security. Invited Talk, PLAS 2006, June 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. R. J. Walker and K. Viggers. Implementing protocols via declarative event patterns. In SIGSOFT FSE, pages 159--169, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. B. D. Win, V. Shah, W. Joosen, and R. Bodkin. Report of the AOSD2004 workshop on AOSD technology for application-level security. Technical report, Department of Computer Science, K.U.Leuven, Leuven, Belgium, 2005.Google ScholarGoogle Scholar
  26. B. D. Win, B. Vanhaute, and B. D. Decker. Security Through Aspect-Oriented Programming. In Network Security, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. K. Yee. User Interaction Design for Secure Systems. In International Conference on Information and Computer Security, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Z. J. Zhu and M. Zulkernine. Towards an Aspect-Oriented Intrusion Detection Framework. In COMPSAC '07: Proceedings of the 31st Annual International Computer Software and Applications Conference -- Vol. 1, pages 637--638. IEEE Computer Society, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Enforcing security for desktop clients using authority aspects

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            AOSD '09: Proceedings of the 8th ACM international conference on Aspect-oriented software development
            March 2009
            278 pages
            ISBN:9781605584423
            DOI:10.1145/1509239

            Copyright © 2009 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 2 March 2009

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate41of139submissions,29%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader