SMask: Preventing Injection Attacks in Web Applications by Approximating Automatic Data/Code Separation

被引:0
|
作者
Johns, Martin [1 ]
Beyerlein, Christian [1 ]
机构
[1] Univ Hamburg, Dept Informat, D-22527 Hamburg, Germany
关键词
Code Injection; Web Application;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Web applications employ a heterogeneous set of programming languages: the language that was used to write the application's logic and several supporting languages. Supporting languages are e.g., server-side languages for data management like SQL and client-side interface languages such as HTML and JavaScript. These languages are handled as string values by the application's logic. Therefore, no syntactic means exists to differentiate between executable code and generic data. This circumstance is the root of most code injection vulnerabilities: Attackers succeed in providing malicious data that is executed by the application as code. In this paper we introduce SMask, a novel approach towards approximating data/code separation. By using string masking to persistently mark legitimate code in string values, SMask is able to identify code that was injected during the processing of an http request. SMask works transparently to the application and is implementable either by integration in the application server or by source-to-source translation using code instrumentation.
引用
收藏
页码:284 / 291
页数:8
相关论文
共 50 条
  • [1] An Architectural approach to preventing code injection attacks
    Riley, Ryan
    Jiang, Xuxian
    Xu, Dongyan
    37TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2007, : 30 - +
  • [2] An Architectural Approach to Preventing Code Injection Attacks
    Riley, Ryan
    Jiang, Xuxian
    Xu, Dongyan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2010, 7 (04) : 351 - 365
  • [3] Automated Discovery of Java']JavaScript Code Injection Attacks in PHP Web Applications
    Gupta, Shashank
    Gupta, B. B.
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 82 - 87
  • [4] Security Standards Perspective to Fortify Web Database Applications From Code Injection Attacks
    Madan, Sushila
    Madan, Supriya
    UKSIM-AMSS FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS, MODELLING AND SIMULATION, 2010, : 226 - +
  • [5] Prediction of SQL Injection Attacks in Web Applications
    Arumugam, Chamundeswari
    Dwarakanathan, Varsha Bhargavi
    Gnanamary, S.
    Neyveli, Vishalraj Natarajan
    Ramesh, Rohit Kanakuppaliyalil
    Kandhavel, Yeshwanthraa
    Balakrishnan, Sadhanandhan
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS, ICCSA 2019, PT IV, 2019, 11622 : 496 - 505
  • [6] The essence of command injection attacks in web applications
    Su, ZD
    Wassermann, G
    ACM SIGPLAN NOTICES, 2006, 41 (01) : 372 - 382
  • [7] Code Pointer Masking: Hardening Applications against Code Injection Attacks
    Philippaerts, Pieter
    Younan, Yves
    Muylle, Stijn
    Piessens, Frank
    Lachmund, Sven
    Walter, Thomas
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, 2011, 6739 : 194 - 213
  • [8] Automatic Code Generation of MVC Web Applications
    Paolone, Gaetanino
    Marinelli, Martina
    Paesani, Romolo
    Di Felice, Paolino
    COMPUTERS, 2020, 9 (03) : 1 - 29
  • [9] Automated Code Injection Prevention for Web Applications
    Luo, Zhengqin
    Rezk, Tamara
    Serrano, Manuel
    THEORY OF SECURITY AND APPLICATIONS, 2012, 6993 : 186 - 204
  • [10] Cross Channel Scripting and Code Injection Attacks on Web and Cloud-Based Applications: A Comprehensive Review
    Indushree, M.
    Kaur, Manjit
    Raj, Manish
    Shashidhara, R.
    Lee, Heung-No
    SENSORS, 2022, 22 (05)