期刊文献+

基于策略断言的SOAP消息签名包装攻击检测

SOAP Messages Based on Policy Assertions Signature Wrapping Attacks Detection
下载PDF
导出
摘要 不合理的使用XML签名会使经过签名的SOAP消息文档的安全性下降,容易受到恶意者的攻击。人们通常使用XML签名来保护SOAP消息,然而恶意者有能力通过改变有效的SOAP消息,以到达其在未获得合法授权的条件下访问被保护的消息的目的。文章首先介绍签名包装攻击的含义,然后模拟出签名包装攻击场景,最后提出一个合理的自定义检测策略断言。实验证明基于可选元素的签名包装攻击的自定义检测策略断言是可行的。 Naive use of XML Signature may result in signed documents remaining vulnerable to undetected modification by an adversary.In the typical usage of XML Signature to protect SOAP messages,an adversary may be capable of modifying valid messages in order to gain unauthorized access to protected resources.In this paper,we first introduce the definition of signature wrapping attacks,then provide a possible scenario that enable these signature wrapping attacks,and last propose appropriate customized policy assertions.Our experiments show that the signature wrapping attacks detection based on customized policy assertions work very well.
出处 《微计算机信息》 2011年第10期129-131,共3页 Control & Automation
关键词 SOAP消息 XML签名 包装攻击 安全策略断言 SOAP Message XML Signature Wrapping Attacks Security Policy Assertion
  • 相关文献

参考文献11

  • 1金键,张鸿,梁嘉华,钱华林.Web服务安全性分析[J].微电子学与计算机,2004,21(3):19-24. 被引量:13
  • 2Nadalin, A., Kaler, C., Hallam-Baker, P., Monzillo, R. (editors) Web Services Security: SOAP Message Security1.0 (WS-Security 2004): OASIS Standard 200401, March2004.
  • 3杨鲲鹏,李海峰.SOAP消息安全性分析及其加密、签名的实现[J].计算机与现代化,2005(6):123-126. 被引量:6
  • 4Eastlake, D., Reagle, J., Solo, D. (editors): XML-Signature Syntax and Processing: W3C Recommendation: 12 February 2002.
  • 5李兴国,娄小广,顾东晓.基于SOAP消息的Web服务安全模型研究[J].微计算机信息,2010,26(30):83-85. 被引量:5
  • 6Nadalin, A., Kaler, C., Hallam-Baker, P., Monzillo, R. (editors) Web Services Security: SOAP Message Security1.0 (WS-Security 2004): OASIS Standard 200401,March2004.
  • 7M. McIntosh and P. Austel. XML signature element wrapping attacks and countermeasures. In Workshop on Secure Web Services, 2005.
  • 8Meika Jensen, Nils Grusehka and Ralph Herkenhoner. A Survey of Attacks on Web Services Classification and Countermeasures. Computer Science - Research and Development, 2009, Volume 24, Number 4, Pages 185-197.
  • 9keytool-密钥和证书管理工具1.2008-06.http://blog.sina.com.cn/s/blog_55dd3fb3010080k4.html.
  • 10Karthikeyan Bhargavan, Cedric Fournet, Andrew D. Gordon, and Greg O'Shea. An advisor for Web Services security policies. In SWS '05: Proceedings of the 2005 workshop on Secure web services, pages 1 - 9, New York, NY, USA, 2005. ACM Press.

二级参考文献12

  • 1Sarah Evans, Olwyn Dowling. Is SSL enough security for first-generation Web services? At http://www.webservices.org.
  • 2IBM, Microsoft. Specification: Web Services Security (WS-Security), Version 1.005 April, 2002. http://www-106.ibm.com/developerworks/library/ws-secure/#majorhead7.
  • 3IBM Corporation and Microsoft Corporation. Security in a Web Services World: A Proposed Architecture and Roadmap--A joint security whitepaper from IBM Corporation and Microsoft Corporation. April, 7, 2002,Version 1.0. htt p://www - 106.ibm.com/developerworks/library/ws-secmap/.
  • 4IBM Corporation and Microsoft Corporation. Web Services Security: Moving up the stack--New specifications improve the WS-Security model, http://www-106.ibm.com/developerworksflibrary/ws-secroad/#3.
  • 5James Snell. 保护 Web服务器. IBM Internet Emerging Technologies, 2002 ,11. http://www-900.ibm.com/developerWorks/cnfwebservices/ws-securews/index.shtml.
  • 6柴晓路.SOAP应用模式:基础与安全[EB/OL].http://www-900.ibm.com/developerWorks/cn/xml/x -SOAPapp/partl/index.shtml.,.
  • 7ElliotteRustyHaroldWScottMeans著 孙小玲 商艳莉译.XML技术手册[M].中国电力出版社,..
  • 8龚俭.计算机网络安全导论[M].南京:东南大学出版社,2002..
  • 9Bob Atkinson,Giovanni Della-Libera,Satoshi Hada,et al. Web-Security[DB/OL]. http://www.ibm.com/developerworks/library/ws-secure/,2002-04-05.
  • 10Donald Eastlake, Joseph Reagle. XML 加密[EB/OL].http://www.w3.org/TR/2002/REC-xmlenc-core-20021210,2002-12-10.

共引文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部