期刊文献+

基于ROP的开放平台安全性研究

Open Platform Security Research Based on ROP
下载PDF
导出
摘要 在对ROP框架和Web安全技术进行研究的基础上,介绍了ROP,并与其他技术进行比较,同时分析了XML消息重写攻击对消息本体的影响,并研究了其解决策略。使用Ecplise平台,基于B/S的架构设计实现了一个单点登录系统。采用ROP框架解决第三方平台认证授权问题,利用分层模型来降低系统层与层间的耦合度,提高了系统的可扩展性和可维护性。针对消息本体传输安全问题,提出了ROP-Jusnit方案,并通过测试验证了其安全性和可行性。 On the basis of research on ROP framework and Web security technology,this paper first introduces ROP and compares it with other technologies;at the same time,analyze the influence of XML message rewrite attack on the message body and study on its solution.Then utilize the Ecplise platform,design and realize a single sign-on system based on the B/S framework.Utilize the ROP framework to solve the authorization and certification problem of third party platform,utilize the layered model to lower the coupling degree between each layer in the system,increase the expandability and maintainability of system;secondly,target at the security problem of message body transmission,propose the ROP-Jusnit scheme and its security and feasibility have been verified by tests.
作者 白宏图
出处 《甘肃科学学报》 2017年第1期38-43,共6页 Journal of Gansu Sciences
关键词 安全 认证 授权 ROP Security Authorization Certification ROP
  • 相关文献

参考文献3

二级参考文献19

  • 1百度开放平台详细介绍[EB/OL].[2008-10-26].http://open.baidu.com/.
  • 2淘宝开放平台详细介绍[EB/OL].[2008-03-26].http://open.taobao.com/.
  • 3Facebook.Facebook Developers[EB/OL].(2011-05-15).http://developers.facebook.com.
  • 4OpenSocial Foundation.OpenSocial——It’s Open,It’s Social,It’sup to You[EB/OL].(2011-05-23).http://www.opensocial.org.
  • 5Fielding R T.Architectural Styles and the Design of Network-based Software Architectures[D].Berkeley,USA:University ofCalifornia,2000.
  • 6Hammer E.Beginner’s Guide to OAuth[EB/OL].(2011-07-15).http://hueniverse.com/2007/10/beginners-guide-to-oauth-part-i-overview.
  • 7高嘉阳.Web开放平台安全体系的研究与设计[D].北京:北京邮电大学,2009.
  • 8Hovav Shacham. The Geometry of Innocent Flesh on the Bone: R, eturn-into-libc without Function Calls (on the x86): CCS'07 Proceedings of the 14th ACM conference on Computer and communications security, 2007[C]. New York NY, USA= ACM, 2007:552-561.
  • 9Erik Buchanan, lyan Roemer, Hovav Shacham. When Good Instructions Go Bad: Generalizing R, eturn-Oriented Programming to ff, ISC: CCS'08 Proceedings of the i5th ACM conference on Computer and communications security 2008[C]. New York, NY, USA: ACM , 2008:27-38.
  • 10RIf Oriented Hund, Rootkits Thorsten Holz, Felix C. Freiling. R, eturn- Bypassing Kernel Code Integrity Protection Mechanisms: SSYMO9 Proceedings of the 18th conference on USENIX security symposium, 2009[C]. CA, USA: USENIX Association Berkeley, 2009:586-598.

共引文献42

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部