skip to main content
10.1145/511446.511498acmconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
Article

Abstracting application-level web security

Published:07 May 2002Publication History

ABSTRACT

Application-level web security refers to vulnerabilities inherent in the code of a web-application itself (irrespective of the technologies in which it is implemented or the security of the web-server/back-end database on which it is built). In the last few months application-level vulnerabilities have been exploited with serious consequences: hackers have tricked e-commerce sites into shipping goods for no charge, user-names and passwords have been harvested and condential information (such as addresses and credit-card numbers) has been leaked.In this paper we investigate new tools and techniques which address the problem of application-level web security. We (i) describe a scalable structuring mechanism facilitating the abstraction of security policies from large web-applications developed in heterogenous multi-platform environments; (ii) present a tool which assists programmers develop secure applications which are resilient to a wide range of common attacks; and (iii) report results and experience arising from our implementation of these techniques.

References

  1. The bigwig project. http://www.brics.dk/bigwig/.]]Google ScholarGoogle Scholar
  2. MySQL database server. http://www.mysql.com/.]]Google ScholarGoogle Scholar
  3. PHP hypertext preprocessor. http://www.php.net/.]]Google ScholarGoogle Scholar
  4. Squid web proxy cache. http://www.squid-cache.org/.]]Google ScholarGoogle Scholar
  5. D. Box. Simple object access protocol (SOAP) 1.1. world wide web consortium (W3C). May 2000. http://www.w3.org/TR/SOAP.]]Google ScholarGoogle Scholar
  6. C. Brabrand, A. Mller, M. Ricky, and M. Schwartzbach. Powerforms: Declarative client-side form field validation. World Wide Web Journal, 3(4), 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. CERT. Advisory CA-2000-02: malicious HTML tags embedded in client web requests. http://www.cert.org/advisories/CA-2000-02.html.]]Google ScholarGoogle Scholar
  8. CERT. Understanding malicious content mitigation for web developers. http://www.cert.org/tech tips/ malicious code mitigation.html.]]Google ScholarGoogle Scholar
  9. R. Clayton, G. Danezis, and M. Kuhn. Real world patterns of failure in anonymity systems. In Proceedings of the Workshop on Information Hiding, volume 2137. Springer-Verlag, LNCS, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, and P. Samarati. Fine grained access control for soap e-services. In Proceedings of the 10th International World Wide Web Conference, pages 504--513. ACM, May 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. eEye Digital Security. %u-encoding IDS bypass vulnerability. Advisory AD20010705, http://www.eeye.com/html/Research/Advisories/AD20010705.html.]]Google ScholarGoogle Scholar
  12. D. Flanagan. JavaScript: The Definitive Guide. O'Reilly. ISBN: 1565923928.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. S. Goodley. Security hole threatens british e-tailers. The Daily Telegraph Newspaper (UK). 25th January, 2001. http://www.telegraph.co.uk/et?pg=/et/01/1/25/ecnsecu2.html.]]Google ScholarGoogle Scholar
  14. Internet Security Systems (ISS). Form tampering vulnerabilities in several web-based shopping cart applications. ISS alert. http://xforce.iss.net/alerts/advise42.php.]]Google ScholarGoogle Scholar
  15. B. Jemas, B. M. Bendis, and M. Bagley. Ultimate Spider-man: Power and Responsibility. Marvel Books. ISBN: 078510786X.]]Google ScholarGoogle Scholar
  16. X. Leroy. The Objective Caml System Release 3.0. INRIA, Rocquencourt, France, 2000.]]Google ScholarGoogle Scholar
  17. L. Lorek. New e-rip-off maneuver: Swapping price tags. ZD-Net. 5th March, 2001. http://www.zdnet.com/intweek/stories/news/0,4164,2692337,00.html.]]Google ScholarGoogle Scholar
  18. Microsoft. HOWTO: Review ASP code for CSSI vulnerability. http://support.microsoft.com/support/kb/articles/Q253/1/19.ASP.]]Google ScholarGoogle Scholar
  19. R. Milner. A theory of type-polymorphism in programming. Journal of Computer and System Sciences, 17(3), 1978.]]Google ScholarGoogle ScholarCross RefCross Ref
  20. R. Milner, M. Tofte, R. Harper, and D. MacQueen. The Definition of Standard ML(Revised). MIT Press, 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. C. Musciano and B. Kennedy. HTML & XHTML: The Definitive Guide (4th Edition). O'Reilly, 2000. ISBN: 0-596-00026-X. See page 328.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. R. Peteanu. Best practices for secure web development. Security portal. http://securityportal.com/cover/ coverstory20001030.html.]]Google ScholarGoogle Scholar
  23. R. Peteanu. Best practices for secure web development: Technical details. Security portal. http://securityportal.com/articles/webdev20001103.html.]]Google ScholarGoogle Scholar
  24. R. Petrusha, P. Lomax, and M. Childs. VBscript in a nutshell: a desktop quick reference. O'Reilly. ISBN: 1565927206.]]Google ScholarGoogle Scholar
  25. R. Rivest. The MD5 message digest algorithm. Internet Request For Comments. April 1992. RFC 1321.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Sanctum Inc. AppShield white paper. March 2001. Available from http://www.sanctuminc.com/.]]Google ScholarGoogle Scholar
  27. B. Schneier. Applied cryptography: protocols, algorithms, and sourcecode in C. John Wiley & Sons, New York, 1994.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. L. D. Stein. Referer refresher. http://www.webtechniques.com/archives/1998/09/webm/.]]Google ScholarGoogle Scholar
  29. P. Syverson. A taxonomy of replay attacks. In Computer Security Foundations Workshop VII. IEEE Computer Society Press, 1994.]]Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Abstracting application-level web security

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        WWW '02: Proceedings of the 11th international conference on World Wide Web
        May 2002
        754 pages
        ISBN:1581134495
        DOI:10.1145/511446

        Copyright © 2002 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 7 May 2002

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate1,899of8,196submissions,23%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader