Securely Handling Inter-Application Connection Credentials

The utilization of application-to-application (A2A) credentials within interpretive language scripts and application code has long been a security risk. The quandaries being how to protect and secure the credentials handled in the main body of code and avoid exploitation from rogue programmers, syst...

Full description

Bibliographic Details
Main Author: Lieberman, Gary
Format: Others
Published: NSUWorks 2012
Subjects:
Online Access:http://nsuworks.nova.edu/gscis_etd/215
http://nsuworks.nova.edu/cgi/viewcontent.cgi?article=1214&context=gscis_etd
id ndltd-nova.edu-oai-nsuworks.nova.edu-gscis_etd-1214
record_format oai_dc
spelling ndltd-nova.edu-oai-nsuworks.nova.edu-gscis_etd-12142016-06-20T03:59:49Z Securely Handling Inter-Application Connection Credentials Lieberman, Gary The utilization of application-to-application (A2A) credentials within interpretive language scripts and application code has long been a security risk. The quandaries being how to protect and secure the credentials handled in the main body of code and avoid exploitation from rogue programmers, system administrators and other users with authorized high levels of privilege. Researchers report that A2A credentials cannot be protected and that there is no way to reduce the risk of the inevitable successful attack and subsequent exploit. Therefore, research efforts to date have primarily been focused on mitigating the impact of the attack rather than finding ways to reduce the attack surface. The work contained herein successfully addresses this serious cross-cutting concern and proves that it is in fact possible to significantly reduce the risk of attack. This reduction of risk was accomplished through implementing a method of credential obfuscation which applied advice with concerns utilizing a composition filter. The filter modified messages containing the credentials as they were sent from the interpretive language script to the remote data store. The modification extracted credentials from a secure password vault and inserted them into the message being sent to the remote data store. This modification moved the handling of the credentials from the main body of code to a secure library and out of the reach of attackers with authorized high levels of privilege. The relocation of the credential handling code lines significantly reduced the attack surface and the overall risk of attack. 2012-01-01T08:00:00Z text application/pdf http://nsuworks.nova.edu/gscis_etd/215 http://nsuworks.nova.edu/cgi/viewcontent.cgi?article=1214&context=gscis_etd CEC Theses and Dissertations NSUWorks Abuse of privilege Application-to-application credentials Aspect Oriented Programming hardcoded passwords Password vault Software Security Computer Sciences
collection NDLTD
format Others
sources NDLTD
topic Abuse of privilege
Application-to-application credentials
Aspect Oriented Programming
hardcoded passwords
Password vault
Software Security
Computer Sciences
spellingShingle Abuse of privilege
Application-to-application credentials
Aspect Oriented Programming
hardcoded passwords
Password vault
Software Security
Computer Sciences
Lieberman, Gary
Securely Handling Inter-Application Connection Credentials
description The utilization of application-to-application (A2A) credentials within interpretive language scripts and application code has long been a security risk. The quandaries being how to protect and secure the credentials handled in the main body of code and avoid exploitation from rogue programmers, system administrators and other users with authorized high levels of privilege. Researchers report that A2A credentials cannot be protected and that there is no way to reduce the risk of the inevitable successful attack and subsequent exploit. Therefore, research efforts to date have primarily been focused on mitigating the impact of the attack rather than finding ways to reduce the attack surface. The work contained herein successfully addresses this serious cross-cutting concern and proves that it is in fact possible to significantly reduce the risk of attack. This reduction of risk was accomplished through implementing a method of credential obfuscation which applied advice with concerns utilizing a composition filter. The filter modified messages containing the credentials as they were sent from the interpretive language script to the remote data store. The modification extracted credentials from a secure password vault and inserted them into the message being sent to the remote data store. This modification moved the handling of the credentials from the main body of code to a secure library and out of the reach of attackers with authorized high levels of privilege. The relocation of the credential handling code lines significantly reduced the attack surface and the overall risk of attack.
author Lieberman, Gary
author_facet Lieberman, Gary
author_sort Lieberman, Gary
title Securely Handling Inter-Application Connection Credentials
title_short Securely Handling Inter-Application Connection Credentials
title_full Securely Handling Inter-Application Connection Credentials
title_fullStr Securely Handling Inter-Application Connection Credentials
title_full_unstemmed Securely Handling Inter-Application Connection Credentials
title_sort securely handling inter-application connection credentials
publisher NSUWorks
publishDate 2012
url http://nsuworks.nova.edu/gscis_etd/215
http://nsuworks.nova.edu/cgi/viewcontent.cgi?article=1214&context=gscis_etd
work_keys_str_mv AT liebermangary securelyhandlinginterapplicationconnectioncredentials
_version_ 1718309806871150592