Distributed System’s Middleware: DCOM's ActiveX versus Java's JavaBeans and CORBA's IIOP.

Slides:



Advertisements
Similar presentations
What is a Computer Program? For a computer to be able to do anything (multiply, play a song, run a word processor), it must be given the instructions.
Advertisements

New Security Issues Raised by Open Cards Pierre GirardJean-Louis Lanet GERMPLUS R&D.
Welcome to Middleware Joseph Amrithraj
Mobile Agents Mouse House Creative Technologies Mike OBrien.
Mobile Code Security Yurii Kuzmin. What is Mobile Code? Term used to describe general-purpose executables that run in remote locations. Web browsers come.
What is RMI? Remote Method Invocation –A true distributed computing application interface for Java, written to provide easy access to objects existing.
COM vs. CORBA.
Introduction To Java Objectives For Today â Introduction To Java â The Java Platform & The (JVM) Java Virtual Machine â Core Java (API) Application Programming.
Mobile Code Security Aviel D. Rubin, Daniel E. Geer, Jr. MOBILE CODE SECURITY, IEEE Internet Computing, 1998 Minkyu Lee
Microsoft Windows XP SP2 Urs P. Küderli Strategic Security Advisor Microsoft Schweiz GmbH.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
CIM2564 Introduction to Development Frameworks 1 Overview of a Development Framework Topic 1.
Lecture 2: Do you speak Java?. From Problem to Program Last Lecture we looked at modeling with objects! Steps to solving a business problem –Investigate.
Web Security A how to guide on Keeping your Website Safe. By: Robert Black.
ACTIVE X By Ethan Huang. OUTLINE What is ActiveX? Component of ActiveX Why ActiveX? ActiveX and Java Security Issue.
28/1/2001 Seminar in Databases in the Internet Environment Introduction to J ava S erver P ages technology by Naomi Chen.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
Using Internet Information Server And Microsoft ® Internet Explorer To Implement Security On The Intranet HTTP.
Active X Microsoft’s Answer to Dynamic Content Reference: Using Active X by Brian Farrar QUE
Mobile Code and Worms By Mitun Sinha Pandurang Kamat 04/16/2003.
Information for Developers Windows XP Service Pack 2 Information for Developers.
Computer Security and Penetration Testing
12-1 © Prentice Hall, 2004 Chapter 12: Design Elements Object-Oriented Systems Analysis and Design Joey F. George, Dinesh Batra, Joseph S. Valacich, Jeffrey.
2851A_C01. Microsoft Windows XP Service Pack 2 Security Technologies Bruce Cowper IT Pro Advisor Microsoft Canada.
Microsoft ® Official Course Module 9 Configuring Applications.
Architecture Of ASP.NET. What is ASP?  Server-side scripting technology.  Files containing HTML and scripting code.  Access via HTTP requests.  Scripting.
1 Modular Software/ Component Software 2 Modular Software Code developed in modules. Modules can then be linked together to produce finished product/program.
Beyond DHTML So far we have seen and used: CGI programs (using Perl ) and SSI on server side Java Script, VB Script, CSS and DOM on client side. For some.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
Chapter 6 Operating System Support. This chapter describes how middleware is supported by the operating system facilities at the nodes of a distributed.
COM vs. CORBA Computer Science at Azusa Pacific University September 19, 2015 Azusa Pacific University, Azusa, CA 91702, Tel: (800) Department.
Introduction to Internet Programming (Web Based Application)
C# Overview and Features. Content I.History of C# II.Architecture III.How to install IV.Features V.Code Sample VI.Microsoft.NET Platform VII.Why use C#
Honeypot and Intrusion Detection System
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
CSAS 2009 Running Windows as a Non- Administrator or how I learned to love “User” By: Kasey Dennler.
® IBM Software Group © 2007 IBM Corporation J2EE Web Component Introduction
1 © 2004, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Using Internet Explorer 7.0 to Access Cisco Unity 5.0(1) Web Interfaces Unity 5.0(1)
Distributed Component Object Model (DCOM)
CS480 Computer Science Seminar Introduction to Microsoft Solutions Framework (MSF)
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
Compatibility and Interoperability Requirements
SE-02 COMPONENTS – WHY? Object-oriented source-level re-use of code requires same source code language. Object-oriented source-level re-use may require.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
CS 7: Introduction to Computer Programming Java and the Internet Sections ,2.1.
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
Module 2 – User Safety Privacy Attacks on end users Browser vulnerabilities.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Web Pages with Features. Features on Web Pages Interactive Pages –Shows current date, get server’s IP, interactive quizzes Processing Forms –Serach a.
November 19, 2008 CSC 682 Use of Virtualization to Thwart Malware Written by: Ryan Lehan Presented by: Ryan Lehan Directed By: Ryan Lehan Produced By:
1 Mobile Code l Java Review –Java code is platform independent and runs within a “sandbox”, or a set of restrictions that keep downloaded applets from.
Understand Permissions LESSON Security Fundamentals.
Java – in context Main Features From Sun Microsystems ‘White Paper’
Internet Explorer 7 Updated Advice for the NHS 04 February 2008 Version 1.3.
Lecture 11 Scrolling XHTML elements + a bit on Java Applets Boriana Koleva Room: C54
Active X and Signed Applets Chad Bollard. Overview ActiveX  Security Features  Hidden Problems Signed Applets  Security Features  Security Problems.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
A S P. Outline  The introduction of ASP  Why we choose ASP  How ASP works  Basic syntax rule of ASP  ASP’S object model  Limitations of ASP  Summary.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Application Sharing Bhavesh Amin Casey Miller Casey Miller Ajay Patel Ajay Patel Bhavesh Thakker Bhavesh Thakker.
Applications Active Web Documents Active Web Documents.
Web-based Software Development - An introduction
HARDENING CLIENT COMPUTERS
What is RMI? Remote Method Invocation
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Chapters 5 & 6 of Web security. pp
COMPONENTS – WHY? Object-oriented source-level re-use of code requires same source code language. Object-oriented source-level re-use may require understanding.
Severity and Exploitability Index
Presentation transcript:

Distributed System’s Middleware: DCOM's ActiveX versus Java's JavaBeans and CORBA's IIOP

COM Component Object Model or Common Object Model Promoted by Microsoft as a general- purpose architecture for building component-based software Main purpose was to define reusable objects for which designer could use to create larger systems from these objects

COM continued Allows developer to create COM objects not specific to any languages or platform as long as they stick to the binary structure Microsoft proposed. –Can interoperate with each other

Introduction to DCOM COM on a wire DCOM stands for Distributed COM Basically, DCOM allows use of component objects present on different machines either within or across networks Put in another way, DCOM is COM on steroids.

ActiveX The Chaos Computer Club of Hamburg, Germany showed how to move funds from one back account to another - all using an ActiveX control. This control tricks finance software Quicken into removing funds from a user's account when a user logs on to their bank. Microsoft, the developer of ActiveX, heard about the incident after receiving a phone call from someone in Germany who viewed the Chaos Computer Club's story on German national television. This incident illustrates the potential dangers associated with ActiveX. Unlike Java applets, which are not capable of reading or writing to local files, ActiveX can do nearly anything. Microsoft plans to launch an ActiveX education campaign in response to this attack.

Some Quotes “Microsoft's core competency is monopolization” Steve Litt, 9/6/2000 Yesterday OLE, COM, DCOM, MFC, IIS, ASP. Today C# and Microsoft.Net. What next? The Open Source world is one of continuous improvement. The Microsoft world is one of continuous U turns. Getting back to technology selection. There are some who believe Microsoft's line that their software provides "interoperability". Don't fall for that line. Microsoft's technology provides crash-prone non-modular systems whose primary design feature is to enhance Microsoft's monopoly power. You can do better than that. Just say no to Microsoft.

Introduction to ActiveX Set of technologies that enables interactive content for WWW Can be invoked from web pages through the use of a scripting language or directly with an HTML object tag Can be signed or unsigned –Signed control provides a high degree of verification that the control was produced by the signer

ActiveX continued –Doesn’t guarantee the trustworthiness of the control’s intended functions. ActiveX are binary code ActiveX executables can be configured to run in certain machines, under certain conditions –Allowing for scalability –Allowing for increase security

DCOM/ActiveX vs CORBA vs Java Openness –Java, CORBA : yes –DCOM/ActiveX: somewhat Platform Independence –Java, CORBA: yes –DCOM/ActiveX:no

Why DCOM/ActiveX isn’t as platform independent as Java or CORBA “Microsoft unapologetically will make sure ActiveX works best on Windows” –Bob Muglia, Microsoft (Source: Client Server News and Red Herring Magazine) DCOM/ActiveX isn’t supported on MS- DOS or 16-bit Windows environment

Comparisons continued Language Independce –Java: no –DCOM/ActiveX: somewhat –CORBA: yes WWW support –Java: yes –DCOM/ActiveX: 32 bit windows only –CORBA: yes

Comparisons continued Scalable? –CORBA: definitely yes –Java: more so than ActiveX –DCOM/ActiveX: no Security: –CORBA: yes –DCOM/ActiveX: no –Java’s JavaBeans: yes

Comparisons continued Benefits: –ActiveX: a. reusable components b. has more capabilities than Java’s JavaBeans c. are available to meet many needs and functionalities –JavaBeans: a. reusable b. secure c. trusted JavaBeans has more functionalities than regular applets. -CORBA: a. mature

Comparisons continued DCOM’s main competitor is CORBA; whereas, ActiveX main competitor is Java’s JavaBeans CORBA and Java complement each other.

Fallacies regarding ActiveX All ActiveX controls are unsafe All ActiveX controls either are the same as regular executable files or differs from them completely ActiveX controls make IE unsafe due to its lack of security ActiveX controls are safe because they are signed

Fallacies continued All ActiveX controls problems can be avoided if you just avoid using IE

ActiveX Security and Risks Can be divided as follows: 1.Imported/Install Controls 2a. Scripted Controls 2b. Execution Controls

Imported/Installed Controls Has no way to measure their capabilities –Should be base on the source of the control –Inadequate for 2 reasons: Signer of control may not be able to determine the control safety as the end user is End user must trust the distribution sequence. That is, it wasn’t modify somewhere in that distribution sequence to make it malicious Signatures persist

Imported/Installed Controls Controls need only be registered once per machine –Will lead to problems if a machine is shared by multiple users. Any one user is capable of downloading a control, at which point it is available to all the users on that machine. –Even worse if the machine is shared on a network Controls does not always has a solution to a particular vulnerability.

Scripted Controls Responsible for implementing their own security Can be used in ways that were unintended by its original author. Can lead to unexpected behaviors that could be exploited by hackers Can invoke other controls without the user knowledge.

Scripted Controls Can escape the confines of the IE’s environment Controls’ engines might not provide IE’s security regarding ActiveX Its cross-site scripting is poorly understood –Can lead to vulnerabilities regarding cross- site scripting attacks

Execution Controls Running controls has more capabilities than tools that run strictly in IE’s environment –Due to fact it is native code Running controls can be based on IE’s securities. However, ActiveX controls do not rely on IE; can be installed and executed without using IE.

Execution Controls Cont. Running controls run under the privileges of current user. No known way of restricting its privileges Running controls do not have an effective level of abstraction Running controls are fairly difficult to assess and manage Running controls’ securities are fairly coarse. It’s all-or-nothing in IE.

Securing ActiveX Controls Using Administrator Approved setting Using Authenticode Using CodeBaseSearchPath Using Internet Explorer Administrator Kit Using IObjectSafety Using kill bit Using security zones including a fifth built- in zone, called ‘My Computer’ zone

Broadening ActiveX Appeal Make it more secure through the use of some kind of sandbox like Java Make it where it is platform independent like.NET or JVM Don’t have this windows-only mentality

Conclusions Microsoft can make ActiveX more appealing if they were to provide more security to ActiveX They need to embrace CORBA not work against it They need to work with Java, not against it