Sciweavers

ISORC
2007
IEEE

Security Analysis of the Utilization of Corba Object References as Authorization Tokens

14 years 6 months ago
Security Analysis of the Utilization of Corba Object References as Authorization Tokens
In object-oriented real-time computing scenarios, particularly where Corba is used in embedded systems with resource constraints, developers and system architects often utilize Corba object references as authorization tokens. This paper investigates the security of this method in principle, and it presents the results of the analysis of the work and computing effort necessary for a potential attacker to fabricate Corba object references to existing objects for the purpose of illegitimately gaining access to these objects at the instance of seven widely used Corba products.
Christoph Becker, Sebastian Staamann, Ralf Salomon
Added 04 Jun 2010
Updated 04 Jun 2010
Type Conference
Year 2007
Where ISORC
Authors Christoph Becker, Sebastian Staamann, Ralf Salomon
Comments (0)