Java Security: a Ten Year Retrospective
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
A Java Security Scanner for Eclipse
Colby College Digital Commons @ Colby Honors Theses Student Research 2005 JeSS – a Java Security Scanner for Eclipse Russell Spitler Colby College Follow this and additional works at: https://digitalcommons.colby.edu/honorstheses Part of the Databases and Information Systems Commons, Other Computer Engineering Commons, Programming Languages and Compilers Commons, and the Systems Architecture Commons Colby College theses are protected by copyright. They may be viewed or downloaded from this site for the purposes of research and scholarship. Reproduction or distribution for commercial purposes is prohibited without written permission of the author. Recommended Citation Spitler, Russell, "JeSS – a Java Security Scanner for Eclipse" (2005). Honors Theses. Paper 567. https://digitalcommons.colby.edu/honorstheses/567 This Honors Thesis (Open Access) is brought to you for free and open access by the Student Research at Digital Commons @ Colby. It has been accepted for inclusion in Honors Theses by an authorized administrator of Digital Commons @ Colby. JeSS – a Java Security Scanner for Eclipse Russell Spitler Senior Honors Thesis Spring 2005 Colby College Department of Computer Science Advisor: Dale Skrien Contents Chapter 1 Introduction 1 Chapter 2 Secure Coding and Java Security 2.1 – Secure Coding 3 2.2 – Java Security 7 Chapter 3 Java Security Holes 3.1 – Don’t depend on initialization 13 3.2 – Make everything final 14 3.3 – Make your code unserializable and undeserializable 16 3.4 – Make your class non-Cloneable 19 3.5 – Don’t rely on -
Apache Tomcat 9
Apache Tomcat 9 Preview Mark Thomas, September 2015 © 2015 Pivotal Software, Inc. All rights reserved. 2 Introduction Apache Tomcat committer since December 2003 – [email protected] Tomcat 8 release manager Member of the Servlet, WebSocket and EL expert groups Consultant Software Engineer @ Pivotal Currently focused on Apache Tomcat 9 © 2015 Pivotal Software, Inc. All rights reserved. 3 Agenda Specification mandated new features Tomcat specific new features Tomcat features removed Internal changes © 2015 Pivotal Software, Inc. All rights reserved. 4 Tomcat versions Minimum 1st Stable Tomcat JavaEE Servlet JSP EL WebSocket JASPIC EOL Java SE Release 5.x 4 1.4 2.4 2.0 N/A N/A N/A 08 2004 09 2012 6.x 5 5 2.5 2.1 2.1 N/A N/A 02 2007 12 2016 7.x 6 6 3.0 2.2 2.2 1.1 N/A 01 2011 TBD 8.x 7 7 3.1 2.3 3.0 1.1 N/A 02 2014 TBD 9.x 8 8 4.0 2.4? 3.1? 2.0? 1.1? Q4 2016? TBD © 2015 Pivotal Software, Inc. All rights reserved. 5 Specification changes © 2015 Pivotal Software, Inc. All rights reserved. 6 Specifications JavaEE 8 Key elements – HTML 5.0 – HTTP/2 – Simplification – Better integration for managed beans – Better infrastructure for the cloud © 2015 Pivotal Software, Inc. All rights reserved. 7 Specifications Servlet 4.0 Work started, stalled and is now starting again – Driven by JavaOne HTTP/2 Ease of use improvements – HttpFilter, default methods Clarifications – Starting to make progress © 2015 Pivotal Software, Inc. -
Java EE 7 Overview and Status
Java EE 7 Overview and Status Peter Doschkinow Senior Java Architect The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. Agenda . Java EE 7 Revised Scope . HTML5 Technologies . Productivity Improvements . Status and Roadmap Productivity Java EE Past, Present, & Future & HTML5 Java EE 7 Lightweight JMS 2.0, Ease of Java EE 6 Batch, Development Caching, TX Interceptor, Web Java EE 5 Pruning, WebSocket, Services Extensibility JSON Ease of Dev, J2EE 1.4 CDI, JAX-RS JAX-RPC, Enterprise Robustness CMP/ BMP, Ease of JSR 88 Java Platform J2EE 1.3 Web Development, Services Annotations, Web J2EE 1.2 Mgmt, EJB 3.0, JPA, Web Profile Deployment, JSF, JAXB, Profile Servlet, JSP, CMP, Async JAX-WS, Servlet 3.0, JAX-RS 2.0 EJB, JMS, Connector Connector StAX, SAAJ EJB 3.1 Lite RMI/IIOP Architecture Dec 1999 Sep 2001 Nov 2003 May 2006 Dec 2009 Q2 2013 10 specs 13 specs 20 specs 23 specs 28 specs 32+ specs Java EE 7 Revised Scope . PaaS theme postponed for Java EE 8 . HTML5 Support – WebSocket, JSON – HTML5 forms and markup . Higher Productivity – Less Boilerplate – Richer Functionality – More Defaults Java EE 7 – Candidate JSRs PaaS Theme Postponed for Java EE 8 . Reasons – Not enough experience in tenants management, provisioning, deployment and elasticity implementation in Cloud environments – Not enough consensus and substance as of August 2012 . -
Eu-19-Zhang-New-Exploit-Technique
New Exploit Technique In Java Deserialization Attack • Yang Zhang • Yongtao Wang Keyi Li “在此键⼊引⽂。• ” • Kunzhe Chai –Johnny Appleseed New Exploit Technique In Java Deserialization Attack Back2Zero Team BCM Social Corp. BCM Social Group Who are we? Yang Zhang(Lucas) • Founder of Back2Zero Team & Leader of Security Research Department in BCM Social Corp. • Focus on Application Security, Cloud Security, Penetration Testing. • Spoke at various security conferences such as CanSecWest, POC, ZeroNights. Keyi Li(Kevin) • Master degree majoring in Cyber Security at Syracuse University. • Co-founder of Back2Zero team and core member of n0tr00t security team. • Internationally renowned security conference speaker. –Johnny Appleseed Who are we? Yongtao Wang • Co-founder of PegasusTeam and Leader of Red Team in BCM Social Corp. • Specializes in penetration testing and wireless security. • Blackhat, Codeblue, POC, Kcon, etc. Conference speaker. Kunzhe Chai(Anthony) • Founder of PegasusTeam and Chief Information Security Officer in BCM Social Corp. • Author of the well-known security tool MDK4. • Maker of China's first Wireless Security Defense Product Standard and he also is the world's first inventor of Fake Base Stations defense technology–Johnny Appleseed Agenda • Introduction to Java Deserialization • Well-Known Defense Solutions • Critical vulnerabilities in Java • URLConnection • JDBC • New exploit for Java Deserialization • Takeaways 2015: Chris Frohoff and Gabriel Lawrence presented their research into Java object deserialization vulnerabilities ultimately resulting in what can be readily described as the biggest wave of RCE bugs in Java history. Introduction to Java Deserialization Java Deserialization Serialization • The process of converting a Java object into stream of bytes. Databases Deserialization Serialization • A reverse process of creating a Java object from stream of bytes. -
Apache Harmony Project Tim Ellison Geir Magnusson Jr
The Apache Harmony Project Tim Ellison Geir Magnusson Jr. Apache Harmony Project http://harmony.apache.org TS-7820 2007 JavaOneSM Conference | Session TS-7820 | Goal of This Talk In the next 45 minutes you will... Learn about the motivations, current status, and future plans of the Apache Harmony project 2007 JavaOneSM Conference | Session TS-7820 | 2 Agenda Project History Development Model Modularity VM Interface How Are We Doing? Relevance in the Age of OpenJDK Summary 2007 JavaOneSM Conference | Session TS-7820 | 3 Agenda Project History Development Model Modularity VM Interface How Are We Doing? Relevance in the Age of OpenJDK Summary 2007 JavaOneSM Conference | Session TS-7820 | 4 Apache Harmony In the Beginning May 2005—founded in the Apache Incubator Primary Goals 1. Compatible, independent implementation of Java™ Platform, Standard Edition (Java SE platform) under the Apache License 2. Community-developed, modular architecture allowing sharing and independent innovation 3. Protect IP rights of ecosystem 2007 JavaOneSM Conference | Session TS-7820 | 5 Apache Harmony Early history: 2005 Broad community discussion • Technical issues • Legal and IP issues • Project governance issues Goal: Consolidation and Consensus 2007 JavaOneSM Conference | Session TS-7820 | 6 Early History Early history: 2005/2006 Initial Code Contributions • Three Virtual machines ● JCHEVM, BootVM, DRLVM • Class Libraries ● Core classes, VM interface, test cases ● Security, beans, regex, Swing, AWT ● RMI and math 2007 JavaOneSM Conference | Session TS-7820 | -
Java Security, 2Nd Edition
Table of Contents Preface..................................................................................................................................................................1 Who Should Read This Book?.................................................................................................................1 Versions Used in This Book....................................................................................................................2 Conventions Used in This Book..............................................................................................................2 Organization of This Book.......................................................................................................................3 What's New in This Edition.....................................................................................................................5 How to Contact Us...................................................................................................................................5 Acknowledgments....................................................................................................................................6 Feedback for the Author..........................................................................................................................6 Chapter 1. Java Application Security...............................................................................................................7 1.1 What Is Security?...............................................................................................................................7 -
Openjdk – the Future of Open Source Java on GNU/Linux
OpenJDK – The Future of Open Source Java on GNU/Linux Dalibor Topić Java F/OSS Ambassador Blog aggregated on http://planetjdk.org Java Implementations Become Open Source Java ME, Java SE, and Java EE 2 Why now? Maturity Java is everywhere Adoption F/OSS growing globally Innovation Faster progress through participation 3 Why GNU/Linux? Values Freedom as a core value Stack Free Software above and below the JVM Demand Increasing demand for Java integration 4 Who profits? Developers New markets, new possibilities Customers More innovations, reduced risk Sun Mindshare, anchoring Java in GNU/Linux 5 License + Classpath GPL v2 Exception • No proprietary forks (for SE, EE) • Popular & trusted • Programs can have license any license • Compatible with • Improvements GNU/Linux remain in the community • Fostering adoption • FSFs license for GNU Classpath 6 A Little Bit Of History Jun 1996: Work on gcj starts Nov 1996: Work on Kaffe starts Feb 1998: First GNU Classpath Release Mar 2000: GNU Classpath and libgcj merge Dec 2002: Eclipse runs on gcj/Classpath Oct 2003: Kaffe switches to GNU Classpath Feb 2004: First FOSDEM Java Libre track Apr 2004: Richard Stallman on the 'Java Trap' Jan 2005: OpenOffice.org runs on gcj Mai 2005: Work on Harmony starts 7 Sun & Open Source Java RIs Juni 2005: Java EE RI Glassfish goes Open Source Mai 2006: First Glassfish release Mai 2006: Java announced to go Open Source November 2006: Java ME RI PhoneME goes Open Source November 2006: Java SE RI Hotspot und Javac go Open Source Mai 2007: The rest of Java SE follows suit 8 Status: JavaOne, Mai 2007 OpenJDK can be fully built from source, 'mostly' Open Source 25,169 Source code files 894 (4%) Binary files (“plugs”) 1,885 (8%) Open Source, though not GPLv2 The rest is GPLv2 (+ CP exception) Sun couldn't release the 4% back then as free software. -
Java(8$ Andrew$Binstock,$Editor$In$Chief,$Dr.Dobbs$
Java$Update$and$Roadmap$ November(2014( Tomas$Nilsson$ Senior$Principal$Product$Manager$ Java$SE$ Copyright$©$2014,$Oracle$and/or$its$affiliates.$All$rights$reserved.$$|$ Safe$Harbor$Statement$ The$following$is$intended$to$outline$our$general$product$direcNon.$It$is$intended$for$ informaNon$purposes$only,$and$may$not$be$incorporated$into$any$contract.$It$is$not$a$ commitment$to$deliver$any$material,$code,$or$funcNonality,$and$should$not$be$relied$upon$ in$making$purchasing$decisions.$The$development,$release,$and$Nming$of$any$features$or$ funcNonality$described$for$Oracle’s$products$remains$at$the$sole$discreNon$of$Oracle.$ Copyright$©$2014,$Oracle$and/or$its$affiliates.$All$rights$reserved.$$|$ Agenda$ 1( Oracle$and$Java$ 2( Java$SE$8$Overview$ 3( Java$SE$9$and$Beyond$ Copyright$©$2014,$Oracle$and/or$its$affiliates.$All$rights$reserved.$$|$ 1( Oracle$and$Java$ 2( Java$SE$8$Overview$ 3( Roadmap$ Copyright$©$2014,$Oracle$and/or$its$affiliates.$All$rights$reserved.$$|$ Oracle$and$Java$ • Oracle$has$used$Java$since$the$beginning$of$Nme$(eg$1990s)$ • Acquired$JAVA$(Sun$Microsystems)$in$2010,$including$Java$IP,$trademarks$ • Embraced$OpenJDK,$open$community,$open$JCP$ – Welcomed$IBM,$Apple,$SAP,$ARM,$AMD,$Intel,$Twi\er,$Goldman$Sachs,$Microso^$and$many$others$ – Made$OpenJDK$official$Java$SE$reference$implementaNon$ – Ongoing$move$towards$open$development,$governance,$transparency$ • JDK$development:$Oracle$and$community$ – Oracle$focus$on$modernizaNon,$security,$big$Ncket$R&D$and$commercial$value$to$Oracle$ – Community$contributes$based$on$interest$and$ability,$examples:$ -
Java Magazine Is Provided on an “As Is” Basis
//NOVEMBER/DECEMBER 2014 / THE INTERNET OF THINGS JAVA IS EVERYWHERE 13 29 20 HENRIK STÅHL INDUSTRIAL AUTOMATION JAVA: THE NEXT ON JAVA AND IOT WITH ROBOTS GENERATION ORACLE.COM/JAVAMAGAZINE //table of contents / 13 20 29 COMMUNITY JAVA: THE NEXT ROBOTS MAKE JAVA DEVELOPMENT GENERATION FACTORIES Teach kids to code SMARTER and give them tools Keba’s systems help FOR THE INTERNET for success. usher in the next OF THINGS industrial revolution. JAVA IN ACTION Oracle’s Henrik Ståhl discusses the Internet of Things for Java developers. Internet of Things JAVA TECH New theme icon. See how it works. COVER ART BY LINDY GROENING COMMUNITY JAVA TECH 45 55 03 35 Embedded Rich Client ABOUT US From the Editor New to Java A Smart-Home Platform Building Castles in the Sky 05 Code Java on the Raspberry Pi for the Mass Market Use JavaFX 3D to model historical Java Nation BlueJ brings Java SE 8 development Eclipse SmartHome bridges the gap treasures and more. JavaOne recap, plus news, directly to the Raspberry Pi. between tech-savvy users and average 62 people, events, and books 38 users to provide a smart-home platform Rich Client for everyone. Java Architect A Bridge from Java 2D to JavaFX 25 50 JCP Executive Series jdeps, Compact Profiles, Profit from the easy migration path The Java Advantage for IoT and Java Modularity Embedded provided by FXGraphics2D. Freescale’s Maulin Patel discusses the A look at the future of Java modularity The Device I/O API 67 Internet of Things (IoT) and how the JCP 41 A standard API for peripherals and Fix This helps to facilitate evolving technologies. -
Distributing Configuration with Apache Tamaya
Configure Once, run everyhere! Configuration with Apache Tamaya BASEL BERN BRUGG DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. GENF HAMBURG KOPENHAGEN LAUSANNE MÜNCHEN STUTTGART WIEN ZÜRICH About Me Anatole Tresch Principal Consultant, Trivadis AG (Switzerland) Star Spec Lead Technical Architect, Lead Engineer PPMC Member Apache Tamaya @atsticks [email protected] [email protected] 6.09.16 Configure once, run everywhere 2 Agenda ● Motivation ● Requirements ● The API ● Configuration Backends ● Demo ● Extensions 6.09.16 Configure once, run everywhere 3 Motivation 6.09.16 Configure once, run everywhere 4 What is Configuration ? Simple Key/value pairs? Typed values? 6.09.16 Configure once, run everywhere 5 When is Configuration useful? Use Cases? 6.09.16 Configure once, run everywhere 6 How is it stored? Remotely or locally? Classpath, file or ...? Which format? All of the above (=multiple sources) ? 6.09.16 Configure once, run everywhere 7 When to configure? Develpment time ? Build/deployment time? Startup? Dynamic, anytime? 6.09.16 Configure once, run everywhere 8 Configuration Lifecycle ? Static ? Refreshing ? Changes triggered ? 6.09.16 Configure once, run everywhere 9 Do I need a runtime ? Java SE? Java EE? OSGI? 6.09.16 Configure once, run everywhere 10 Requirements 6.09.16 Bezeichnung Präsentation Requirements ● Developer‘s Perspective ● Architectural/Design Requirements ● Operational Aspects ● Other Aspects 6.09.16 Configure once, run everywhere 12 Developer‘s Requirements ● Easy to use. ● Developers want defaults. ● Developers -
Evaluating the Flexibility of the Java Sandbox
Evaluating the Flexibility of the Java Sandbox Zack Coker, Michael Maass, Tianyuan Ding, Claire Le Goues, and Joshua Sunshine Carnegie Mellon University {zfc,mmaass}@cs.cmu.edu, [email protected], {clegoues,sunshine}@cs.cmu.edu ABSTRACT should protect both the host application and machine from The ubiquitously-installed Java Runtime Environment (JRE) malicious behavior. In practice, these security mechanisms provides a complex, flexible set of mechanisms that support are problematically buggy such that Java malware is often the execution of untrusted code inside a secure sandbox. able to alter the sandbox's settings [4] to override security However, many recent exploits have successfully escaped the mechanisms. Such exploits take advantage of defects in either sandbox, allowing attackers to infect numerous Java hosts. the JRE itself or the application's sandbox configuration to We hypothesize that the Java security model affords devel- disable the security manager, the component of the sandbox opers more flexibility than they need or use in practice, and responsible for enforcing the security policy [5, 6, 7, 8]. thus its complexity compromises security without improving In this paper, we investigate this disconnect between theory practical functionality. We describe an empirical study of the and practice. We hypothesize that it results primarily from ways benign open-source Java applications use and interact unnecessary complexity and flexibility in the design and with the Java security manager. We found that developers engineering of Java's security mechanisms. For example, regularly misunderstand or misuse Java security mechanisms, applications are allowed to change the security manager at that benign programs do not use all of the vast flexibility runtime, whereas static-only configuration of the manager afforded by the Java security model, and that there are clear would be more secure. -
No. 18-956 Petitioner, V. Respondent. on Writ of Certiorari to the U.S
No. 18-956 IN THE GOOGLE LLC, Petitioner, v. ORACLE AMERICA, INC., Respondent. On Writ of Certiorari to the U.S. Court of Appeals for the Federal Circuit JOINT APPENDIX VOLUME 1 PAGES 1-341 Thomas C. Goldstein E. Joshua Rosenkranz GOLDSTEIN & RUSSELL, P.C. ORRICK, HERRINGTON & 7475 Wisconsin Ave. SUTCLIFFE LLP Suite 850 51 West 52nd Street Bethesda, MD 20814 New York, NY 10019 (202) 362-0636 (212) 506-5000 [email protected] [email protected] Counsel of Record for Petitioner Counsel of Record for Respondent PETITION FOR A WRIT OF CERTIORARI FILED JAN. 24, 2019 CERTIORARI GRANTED NOV. 15, 2019 TABLE OF CONTENTS VOLUME 1 Docket Excerpts: U.S. Court of Appeals for the Federal Circuit, No. 13-1021 .................................. 1 Docket Excerpts: U.S. Court of Appeals for the Federal Circuit, No. 17-1118 .................................. 3 Docket Excerpts: U.S. District Court for the Northern District of California, No. 3:10-cv-03561 .................................................... 5 Transcript of 2012 Jury Trial Proceedings (excerpts) ............................................................... 30 Final Charge to the Jury (Phase One) and Special Verdict Form, Dist. Ct. Docs. 1018 & 1018-1 (Apr. 30, 2012) ....................................... 72 Special Verdict Form, Dist. Ct. Doc. 1089 (May 7, 2012) ......................................................... 95 Trial Exhibit 7803, Deposition Clips of Henrik Stahl Played by Video During Trial (Jan. 14, 2016) (excerpts) ...................................... 98 Order re 62 Classes and Interfaces, Dist. Ct. Doc. 1839 (May 6, 2016) ...................................... 103 Joint Filing Regarding Agreed Statement Regarding Copyrightability (ECF No. 1788), Dist. Ct. Doc. 1846 (May 7, 2016) ....................... 105 Transcript of 2016 Jury Trial Proceedings (excerpts) ............................................................. 109 Final Charge to the Jury (Phase One) and Special Verdict Form, Dist.