• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

SecuriFly: Runtime Protection and Recovery from Web Application Vulnerabilities,” technical report (2006)

by B Livshits, M Martin, M S Lam
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 13
Next 10 →

Raksha: A Flexible Information Flow Architecture for Software Security

by Michael Dalton, Hari Kannan, Christos Kozyrakis - In International Symposium on Computer Architecture (ISCA , 2007
"... High-level semantic vulnerabilities such as SQL injection and crosssite scripting have surpassed buffer overflows as the most prevalent security exploits. The breadth and diversity of software vulnerabilities demand new security solutions that combine the speed and practicality of hardware approache ..."
Abstract - Cited by 127 (7 self) - Add to MetaCart
High-level semantic vulnerabilities such as SQL injection and crosssite scripting have surpassed buffer overflows as the most prevalent security exploits. The breadth and diversity of software vulnerabilities demand new security solutions that combine the speed and practicality of hardware approaches with the flexibility and robustness of software systems. This paper proposes Raksha, an architecture for software security based on dynamic information flow tracking (DIFT). Raksha provides three novel features that allow for a flexible hardware/software approach to security. First, it supports flexible and programmable security policies that enable software to direct hardware analysis towards a wide range of high-level and low-level attacks. Second, it supports multiple active security policies that can protect the system against concurrent attacks. Third, it supports low-overhead security handlers that allow software to correct, complement, or extend the hardware-based analysis without the overhead associated with operating system traps. We present an FPGA prototype for Raksha that provides a fullfeatured Linux workstation for security analysis. Using unmodified binaries for real-world applications, we demonstrate that Raksha can detect high-level attacks such as directory traversal, command injection, SQL injection, and cross-site scripting as well as low-level attacks such as buffer overflows. We also show that lowoverhead exception handling is critical for analyses such as memory corruption protection in order to address false positives that occur due to the diverse code patterns in frequently used software.
(Show Context)

Citation Context

...nsafe manner, such as executing a tagged SQL command or dereferencing a tagged pointer, a security exception is raised. The generality of the DIFT model has led to the development of several software =-=[4, 14, 5, 28, 13, 18, 15, 21]-=- and hardware [24, 6, 2] implementations. Nevertheless, current DIFT systems do not exhibit all of the characteristics listed above. Software DIFT is flexible, as it can enforce arbitrary policies and...

Finding bugs in web applications using dynamic test generation and explicit state model checking

by Shay Artzi, Adam Kiezun, Julian Dolby, Frank Tip, Danny Dig, Amit Paradkar, Michael D. Ernst - IEEE TRANSACTIONS ON SOFTWARE ENGINEERING , 2010
"... Web script crashes and malformed dynamically generated webpages are common errors, and they seriously impact the usability of Web applications. Current tools for webpage validation cannot handle the dynamically generated pages that are ubiquitous on today’s Internet. We present a dynamic test gener ..."
Abstract - Cited by 42 (4 self) - Add to MetaCart
Web script crashes and malformed dynamically generated webpages are common errors, and they seriously impact the usability of Web applications. Current tools for webpage validation cannot handle the dynamically generated pages that are ubiquitous on today’s Internet. We present a dynamic test generation technique for the domain of dynamic Web applications. The technique utilizes both combined concrete and symbolic execution and explicit-state model checking. The technique generates tests automatically, runs the tests capturing logical constraints on inputs, and minimizes the conditions on the inputs to failing tests so that the resulting bug reports are small and useful in finding and fixing the underlying faults. Our tool Apollo implements the technique for the PHP programming language. Apollo generates test inputs for a Web application, monitors the application for crashes, and validates that the output conforms to the HTML specification. This paper presents Apollo’s algorithms and implementation, and an experimental evaluation that revealed 673 faults in six PHP Web applications.

A Systematic Analysis of XSS Sanitization in Web Application Frameworks

by Joel Weinberger, Prateek Saxena, Devdatta Akhawe, Matthew Finifter, Richard Shin, Dawn Song
"... Abstract. While most research on XSS defense has focused on techniques for securing existing applications and re-architecting browser mechanisms, sanitization remains the industry-standard defense mechanism. By streamlining and automating XSS sanitization, web application frameworks stand in a good ..."
Abstract - Cited by 22 (3 self) - Add to MetaCart
Abstract. While most research on XSS defense has focused on techniques for securing existing applications and re-architecting browser mechanisms, sanitization remains the industry-standard defense mechanism. By streamlining and automating XSS sanitization, web application frameworks stand in a good position to stop XSS but have received little research attention. In order to drive research on web frameworks, we systematically study the security of the XSS sanitization abstractions frameworks provide. We develop a novel model of the web browser and characterize the challenges of XSS sanitization. Based on the model, we systematically evaluate the XSS abstractions in 14 major commercially-used web frameworks. We find that frameworks often do not address critical parts of the XSS conundrum. We perform an empirical analysis of 8 large web applications to extract the requirements of sanitization primitives from the perspective of realworld applications. Our study shows that there is a wide gap between the abstractions provided by frameworks and the requirements of applications. 1

Context-Sensitive Auto-Sanitization in Web Templating Languages Using Type Qualifiers

by Mike Samuel, Prateek Saxena, Dawn Song
"... Scripting vulnerabilities, such as cross-site scripting (XSS), plague web applications today. Most research on defense techniques has focused on securing existing legacy applications written in general-purpose languages, such as Java and PHP. However, recent and emerging applications have widely ado ..."
Abstract - Cited by 20 (0 self) - Add to MetaCart
Scripting vulnerabilities, such as cross-site scripting (XSS), plague web applications today. Most research on defense techniques has focused on securing existing legacy applications written in general-purpose languages, such as Java and PHP. However, recent and emerging applications have widely adopted web templating frameworks that have received little attention in research. Web templating frameworks offer an ideal opportunity to ensure safety against scripting attacks by secure construction, but most of today’s frameworks fall short of achieving this goal. We propose a novel and principled type-qualifier based mechanism that can be bolted onto existing web templating frameworks. Our solution permits rich expressiveness in the templating language while achieving backwards compatibility, performance and formal security through a context-sensitive autosanitization (CSAS) engine. To demonstrate its practicality, we implement our mechanism in Google Closure Templates, a commercially used open-source templating framework that is used in GMail, Google Docs and other applications. Our approach is fast, precise and retrofits to existing commercially deployed template code without requiring any changes or annotations.
(Show Context)

Citation Context

...s for finding scripting vulnerabilities has been widely researched [1, 2, 6, 18, 24, 27, 31–33, 37, 41, 42, 51, 52]. Defense architectures have targeted three broad categories: server-side techniques =-=[5, 32, 43, 49, 52]-=-, purely browser-based techniques [4, 35] and client-server collaborative defenses [19, 26, 36, 46]. Unlike browser-based and client-server defenses, purely server-side approaches are applicable to th...

An empirical analysis of xss sanitization in web application frameworks

by Joel Weinberger, Prateek Saxena, Devdatta Akhawe, Matthew Finifter, Dawn Song, Joel Weinberger, Prateek Saxena, Devdatta Akhawe, Matthew Finifter, Richard Shin, Dawn Song
"... personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires pri ..."
Abstract - Cited by 9 (3 self) - Add to MetaCart
personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission.
(Show Context)

Citation Context

...ell as the flexibility of built-in support for embedding untrusted data in web application output. Prior research has focused on addressing this problem by employing techniques such as taint-tracking =-=[36, 43, 60, 65]-=- or type systems [46]. We aim to quantify how web applications address this challenge differently and how the two may interplay with each other in the future. Addressing Correctness. Ensuring correctn...

Towards Client-side HTML Security Policies

by Joel Weinberger, Adam Barth, Dawn Song
"... With the proliferation of content rich web applications, content injection has become an increasing problem. Cross site scripting is the most prominent example of this. Many systems have been designed to mitigate content injection and cross site scripting. Notable examples are BEEP, BLUEPRINT, and C ..."
Abstract - Cited by 8 (1 self) - Add to MetaCart
With the proliferation of content rich web applications, content injection has become an increasing problem. Cross site scripting is the most prominent example of this. Many systems have been designed to mitigate content injection and cross site scripting. Notable examples are BEEP, BLUEPRINT, and Content Security Policy, which can be grouped as HTML security policies. We evaluate these systems, including the first empirical evaluation of Content Security Policy on real applications. We propose that HTML security policies should be the defense of choice in web applications going forward. We argue, however, that current systems are insufficient for the needs of web applications, and research needs to be done to determine the set of properties an HTML security policy system should have. We propose several ideas for research going forward in this area. 1
(Show Context)

Citation Context

... BLUEPRINT, it would be difficult to deploy with a secure setting on complex applications. 4 Related Work There is extensive work how to discover and eliminate XSS vulnerabilities in web applications =-=[7, 27, 9, 10, 28]-=-. There has been work on both eliminating these vulnerabilities on the server and in the client. This work has focused on treating XSS as a bug to be eliminated from an application, keeping XSS vulner...

THE DESIGN AND IMPLEMENTATION OF HARDWARE SYSTEMS FOR INFORMATION FLOW TRACKING

by Hari Kannan, Subhasish Mitra, Oyekunle Olukotun, Patricia J. Gumport, Vice Provost, Graduate Education
"... ii I certify that I have read this dissertation and that, in my opinion, it is fully adequate ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
ii I certify that I have read this dissertation and that, in my opinion, it is fully adequate
(Show Context)

Citation Context

...such as the execution of a tagged SQL command or the dereferencing of a tagged pointer, a security exception is raised. The generality of the DIFT model has led to the development of several software =-=[17, 19, 52, 66, 67, 71, 73, 93]-=- and hardware [14, 20, 81] implementations. Nevertheless, current DIFT systems are far from ideal. Software DIFT is flexible, as it can enforce arbitrary policies and adapt to protect against differen...

AND THE COMMITTEE ON GRADUATE STUDIES

by Michael Dalton, David Mazieres, Patricia Gumport, Vice Provost, Graduate Education
"... ii I certify that I have read this dissertation and that, in my opinion, it is fully adequate ..."
Abstract - Add to MetaCart
ii I certify that I have read this dissertation and that, in my opinion, it is fully adequate
(Show Context)

Citation Context

...esult because high-level attacks now account for the majority of software exploits [123]. All prior work on high-level attack detection required access to the application source code or Java bytecode =-=[137, 77, 91, 63]-=-. High-level attacks are particularly challenging because they are language and OS independent. Enforcing type safety cannot protect against these semantic attacks, which makes Java and PHP code as vu...

Systematic Techniques for Finding and Preventing Script Injection Vulnerabilities

by Prateek Saxena , 2012
"... ..."
Abstract - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

...ave 45517 reported XSS vulnerabilities (as of June 10, 2012) with new ones being added constantly [130]. Most prior research on finding scripting vulnerabilities has focused on server-side components =-=[8, 132, 16, 62, 85, 75, 107, 121, 72]-=-. In this thesis, we focus on analysis of scripting vulnerabilities in client-side code written in JavaScript, which has received little attention prior to our research. In contrast to several concurr...

Inlined Monitors for Security Policy Enforcement in Web Applications

by Fotios Rafailidis, Ioannis Panagos, Panagiotis Katsaros, Alexandros Arvanitidis
"... Improper input validation in Web Applications undermines their security and this may have disastrous consequences for the users. Input data can or cannot be harmful depending on how they are used with regard to the interactions with the clients and the accessed sensitive resources (e.g. databases an ..."
Abstract - Add to MetaCart
Improper input validation in Web Applications undermines their security and this may have disastrous consequences for the users. Input data can or cannot be harmful depending on how they are used with regard to the interactions with the clients and the accessed sensitive resources (e.g. databases and files). Existing application frameworks cannot guarantee safe input sanitization with respect to all vulnerabilities. Also, when legacy code is incorporated that was not originally written for the Web, its security hardening is costly and error-prone. We propose a reference monitor inlining approach that treats input injection vulnerabilities as a crosscutting concern. Our monitors enforce high-level security policies for taint propagation control, by weaving checks and repair actions into the untrusted code. Taint policies are specified into JavaMOP, a programming framework for generating runtime monitors, which are weaved into the application through the automated Aspect Oriented Programming process. When monitor design is guided by preliminary static taint analysis, the incurred overhead can be reduced. Further improvements are feasible through JavaMOP’s optimizations. As a proof of concept, we present the design and experimental validation of inlined monitors against SQL injection and cross-site scripting attacks.
(Show Context)

Citation Context

...ach is based on Pixy, a static analysis tool that can detect faulty sanitization methods. At runtime, an external automaton monitor prevents SQL and XSS routines from using unsanitized user input. In =-=[21]-=-, the author introduces SecuriFly, a tool based on a Program Query Language (PQL) to express vulnerability specifications. PQL queries are used to generate nondeterministic automata monitors capable t...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University