SMask: Preventing Injection Attacks in Web Applications by Approximating Automatic Data/Code Separation

被引:0
|
作者
Johns, Martin [1 ]
Beyerlein, Christian [1 ]
机构
[1] Univ Hamburg, Dept Informat, D-22527 Hamburg, Germany
来源
APPLIED COMPUTING 2007, VOL 1 AND 2 | 2007年
关键词
Code Injection; Web Application;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Web applications employ a heterogeneous set of programming languages: the language that was used to write the application's logic and several supporting languages. Supporting languages are e.g., server-side languages for data management like SQL and client-side interface languages such as HTML and JavaScript. These languages are handled as string values by the application's logic. Therefore, no syntactic means exists to differentiate between executable code and generic data. This circumstance is the root of most code injection vulnerabilities: Attackers succeed in providing malicious data that is executed by the application as code. In this paper we introduce SMask, a novel approach towards approximating data/code separation. By using string masking to persistently mark legitimate code in string values, SMask is able to identify code that was injected during the processing of an http request. SMask works transparently to the application and is implementable either by integration in the application server or by source-to-source translation using code instrumentation.
引用
收藏
页码:284 / 291
页数:8
相关论文
共 50 条
  • [41] Detecting Heap-Spraying Code Injection Attacks in Malicious Web Pages Using Runtime Execution
    Choi, YoungHan
    Kim, HyoungChun
    Lee, DongHoon
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2012, E95B (05) : 1711 - 1721
  • [42] Creating Web-Based GIS Applications Using Automatic Code Generation Techniques
    Brisaboa, Nieves R.
    Cortinas, Alejandro
    Luaces, Miguel R.
    Pedreira, Oscar
    WEB AND WIRELESS GEOGRAPHICAL INFORMATION SYSTEMS, W2GIS 2017, 2017, 10181 : 19 - 34
  • [43] AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications
    Zhang, Mu
    Yin, Heng
    21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
  • [44] Impact Analysis of False Data Injection Attacks on Automatic Voltage Regulators of Synchronous Generators
    Haider, Mohammad Zakaria
    Mali, Prabin
    Rahman, Mohammad Ashiqur
    Paudyal, Sumit
    2024 IEEE POWER & ENERGY SOCIETY GENERAL MEETING, PESGM 2024, 2024,
  • [45] Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications
    Dalai, Asish Kumar
    Jena, Sanjay Kumar
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [46] Code-injection Vulnerabilities in Web Applications - Exemplified at Cross-site Scripting
    Johns, Martin
    IT-INFORMATION TECHNOLOGY, 2011, 53 (05): : 256 - 259
  • [47] Counterfeit Object-oriented Programming On the Difficulty of Preventing Code Reuse Attacks in C plus plus Applications
    Schuster, Felix
    Tendyck, Thomas
    Liebchen, Christopher
    Davi, Lucas
    Sadeghi, Ahmad-Reza
    Holz, Thorsten
    2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 745 - 762
  • [48] Combating False Data Injection Attacks on Human-Centric Sensing Applications
    Xin, Jingyu
    Phoha, Vir V.
    Salekin, Asif
    PROCEEDINGS OF THE ACM ON INTERACTIVE MOBILE WEARABLE AND UBIQUITOUS TECHNOLOGIES-IMWUT, 2022, 6 (02):
  • [49] Detection of False Data Injection Attacks in Automatic Generation Control Systems Considering System Nonlinearities
    Ayad, Abdelrahman
    Khalaf, Mohsen
    El-Saadany, Ehab
    2018 IEEE ELECTRICAL POWER AND ENERGY CONFERENCE (EPEC), 2018,
  • [50] Evaluation of false data injection attacks on automatic generation control considering wind power dynamics
    Zhang, Xuehan
    Kang, Dong-Joo
    Choi, Sungyun
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2022, 143