Back to Search Start Over

Source Code Analysis to Remove Security Vulnerabilities in Java Socket Programs: A Case Study

Authors :
Meghanathan, Natarajan
Source :
International Journal of Network Security and its Applications (IJNSA), vol. 5, no. 1, pp. 1-16, 2013
Publication Year :
2013

Abstract

This paper presents the source code analysis of a file reader server socket program (connection-oriented sockets) developed in Java, to illustrate the identification, impact analysis and solutions to remove five important software security vulnerabilities, which if left unattended could severely impact the server running the software and also the network hosting the server. The five vulnerabilities we study in this paper are: (1) Resource Injection, (2) Path Manipulation, (3) System Information Leak, (4) Denial of Service and (5) Unreleased Resource vulnerabilities. We analyze the reason why each of these vulnerabilities occur in the file reader server socket program, discuss the impact of leaving them unattended in the program, and propose solutions to remove each of these vulnerabilities from the program. We also analyze any potential performance tradeoffs (such as increase in code size and loss of features) that could arise while incorporating the proposed solutions on the server program. The proposed solutions are very generic in nature, and can be suitably modified to correct any such vulnerabilities in software developed in any other programming language. We use the Fortify Source Code Analyzer to conduct the source code analysis of the file reader server program, implemented on a Windows XP virtual machine with the standard J2SE v.7 development kit.<br />Comment: 16 pages, 16 figures

Details

Database :
arXiv
Journal :
International Journal of Network Security and its Applications (IJNSA), vol. 5, no. 1, pp. 1-16, 2013
Publication Type :
Report
Accession number :
edsarx.1302.1338
Document Type :
Working Paper
Full Text :
https://doi.org/10.5121/ijnsa.2013.5101