Static analysis of role-based access control in J2EE applications

  • Authors:
  • Gleb Naumovich;Paolina Centonze

  • Affiliations:
  • Polytechnic University, Brooklyn, NY;Polytechnic University, Brooklyn, NY

  • Venue:
  • ACM SIGSOFT Software Engineering Notes
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

This work describes a new technique for analysis of Java 2, Enterprise Edition (J2EE) applications. In such applications, Enterprise Java Beans (EJBs) are commonly used to encapsulate the core computations performed on Web servers. Access to EJBs is protected by application servers, according to role-based access control policies that may be created either at development or deployment time. These policies may prohibit some types of users from accessing specific EJB methods.We present a static technique for analyzing J2EE access control policies with respect to security-sensitive fields of EJBs and other server-side objects. Our technique uses points-to analysis to determine which object fields are accessed by which EJB methods, directly or indirectly. Based on this information, J2EE access control policies are analyzed to identify potential inconsistencies that may lead to security holes.