{"title":"Security Analysis of the Utilization of Corba Object References as Authorization Tokens","authors":"Christoph Becker, S. Staamann, R. Salomon","doi":"10.1109/ISORC.2007.54","DOIUrl":null,"url":null,"abstract":"In object-oriented real-time computing scenarios, particularly where Corba is used in embedded systems with resource constraints, developers and system architects often utilize Corba object references as authorization tokens. This paper investigates the security of this method in principle, and it presents the results of the analysis of the work and computing effort necessary for a potential attacker to fabricate Corba object references to existing objects for the purpose of illegitimately gaining access to these objects at the instance of seven widely used Corba products","PeriodicalId":265471,"journal":{"name":"10th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC'07)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"10th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC'07)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISORC.2007.54","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
In object-oriented real-time computing scenarios, particularly where Corba is used in embedded systems with resource constraints, developers and system architects often utilize Corba object references as authorization tokens. This paper investigates the security of this method in principle, and it presents the results of the analysis of the work and computing effort necessary for a potential attacker to fabricate Corba object references to existing objects for the purpose of illegitimately gaining access to these objects at the instance of seven widely used Corba products