Web Application Attack Prevention for Tiered Internet Services

Naples(2008)

引用 4|浏览0
暂无评分
摘要
Because most web application attacks exploit vulnerabilities that result from lack of input validation, a promising approach to thwarting these attacks is to apply validation checks on tainted portions of the operands used in security-sensitive operations, where a byte is tainted if it is data/control dependent on some network packet(s). This paper presents the design, implementation and evaluation of a dynamic checking compiler called WASC, which automatically adds checks into web applications used in three-tier internet services to protect them from the most common two types of web application attacks: SQL- and script-injection attack. In addition to including a taint analysis infrastructure for multi-process and multi-language applications, WASC features the use of SQL and HTML parsers to defeat evasion techniques that exploit interpretation differences between attack detection engines and target applications. Experiments with a fully operational WASC prototype show that it can indeed stop all SQL/script injection attacks that we have tested. Moreover, the end-to-end latency penalty associated with the checks inserted by WASC is less than 30% for the test web applications used in our performance study.
更多
查看译文
关键词
script injection attack,script-injection attack,attack detection engine,test web application,tainted portion,operational wasc prototype show,tiered internet services,web application,web application attack prevention,multi-language application,input validation,web application attack,security,java,network packets,taint analysis,cryptography,web server,sql,internet,web application attacks,servers,information flow,sql injection attack,html
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要