Proceedings of the 27th Annual ACM Symposium on Applied Computing 2012
DOI: 10.1145/2245276.2232004
|View full text |Cite
|
Sign up to set email alerts
|

An empirical analysis of input validation mechanisms in web applications and languages

Abstract: Web applications have become an integral part of the daily lives of millions of users. Unfortunately, web applications are also frequently targeted by attackers, and attacks such as XSS and SQL injection are still common. In this paper, we present an empirical study of more than 7000 input validation vulnerabilities with the aim of gaining deeper insights into how these common web vulnerabilities can be prevented. In particular, we focus on the relationship between the specific programming language used to dev… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
20
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 24 publications
(21 citation statements)
references
References 19 publications
1
20
0
Order By: Relevance
“…The second theorem provides a formal basis for the widely-accepted rule of thumb that it is unsafe to use unvalidated input during query construction [20,27]. Theorem 2 states that if an application always includes an untrusted input (i m ) verbatim in its output (without even inspecting the input), and the same application has some input (v 1 , .., v n ) for which it outputs a valid SQL program, then there exists a way to construct an attack input (a m ) such that the application's output will exhibit a CIAO and therefore a BroNIE.…”
Section: Analysis Of the Bronie Definitionmentioning
confidence: 99%
See 2 more Smart Citations
“…The second theorem provides a formal basis for the widely-accepted rule of thumb that it is unsafe to use unvalidated input during query construction [20,27]. Theorem 2 states that if an application always includes an untrusted input (i m ) verbatim in its output (without even inspecting the input), and the same application has some input (v 1 , .., v n ) for which it outputs a valid SQL program, then there exists a way to construct an attack input (a m ) such that the application's output will exhibit a CIAO and therefore a BroNIE.…”
Section: Analysis Of the Bronie Definitionmentioning
confidence: 99%
“…Given that applications commonly fail to validate untrusted inputs [27], it would be beneficial to have mechanisms for automatically preventing injection attacks. At a high level, BroNIEs can be precisely and automatically prevented by:…”
Section: An Algorithm For Precisely Detecting Broniesmentioning
confidence: 99%
See 1 more Smart Citation
“…XSS Web Application attack mechanisms can be detected indirectly by comparing posted URL to black-listed sites [36], by identifying typical XSS coding patterns [37]. The detection and prevention of XSS attack are difficult because of incomplete implementations, inherent limitations, the complexity of development frameworks and the requirement for run-time compatibility [38].…”
Section: Fig 1 the Difference Between False Negative And False Posimentioning
confidence: 99%
“…Unfortunately, the Web security technology is not so strong that Web applications are often maliciously attacked. It is the complexity of the Web application structure and dynamic Web technology [3], that greatly increases the complexity to detect the Web application injection and proposes the challenge to the research of the problem [4][5][6].…”
Section: Introductionmentioning
confidence: 99%