首页> 外文会议>36th Annual IEEE International Computer Software and Applications Conference.;vol. 1.;Main Conference >Preventing Input Validation Vulnerabilities in Web Applications through Automated Type Analysis
【24h】

Preventing Input Validation Vulnerabilities in Web Applications through Automated Type Analysis

机译:通过自动类型分析防止Web应用程序中的输入验证漏洞

获取原文
获取原文并翻译 | 示例

摘要

Web applications have become an integral part of the daily lives of millions of users. Unfortunately, web applications are also frequently targeted by attackers, and criticial vulnerabilities such as cross-site scripting and SQL injection are still common. As a consequence, much effort in the past decade has been spent on mitigating web application vulnerabilities. Current techniques focus mainly on sanitization: either on automated sanitization, the detection of missing sanitizers, the correctness of sanitizers, or the correct placement of sanitizers. However, these techniques are either not able to prevent new forms of input validation vulnerabilities such as HTTP Parameter Pollution, come with large runtime overhead, lack precision, or require significant modifications to the client and/or server infrastructure. In this paper, we present IPAAS, a novel technique for preventing the exploitation of cross-site scripting and SQL injection vulnerabilities based on automated data type detection of input parameters. IPAAS automatically and transparently augments otherwise insecure web application development environments with input validators that result in significant and tangible security improvements for real systems. We implemented IPAAS for PHP and evaluated it on five real-world web applications with known cross-site scripting and SQL injection vulnerabilities. Our evaluation demonstrates that IPAAS would have prevented 83% of SQL injection vulnerabilities and 65% of cross-site scripting vulnerabilities while incurring no developer burden.
机译:Web应用程序已成为数百万用户日常生活中不可或缺的一部分。不幸的是,Web应用程序也经常成为攻击者的攻击目标,并且诸如跨站点脚本和SQL注入之类的批评性漏洞仍然很常见。结果,在过去的十年中,为减轻Web应用程序漏洞花费了很多精力。当前的技术主要集中于消毒:要么是自动消毒,要么是检测缺少的消毒剂,要么是消毒剂的正确性,要么是正确放置消毒剂。但是,这些技术不能防止新形式的输入验证漏洞(例如HTTP参数污染),运行时开销大,缺乏精度,或者需要对客户端和/或服务器基础结构进行重大修改。在本文中,我们介绍IPAAS,这是一种基于输入参数的自动数据类型检测来防止跨站点脚本和SQL注入漏洞被利用的新技术。 IPAAS通过输入验证器自动透明地扩展了原本不安全的Web应用程序开发环境,从而为实际系统带来了显着而切实的安全性改进。我们为PHP实现了IPAAS,并在五个具有已知跨站点脚本和SQL注入漏洞的实际Web应用程序上对其进行了评估。我们的评估表明,IPAAS可以避免83%的SQL注入漏洞和65%的跨站点脚本漏洞,而不会给开发人员带来负担。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号