Proceedings ArticleDOI
Diesel: applying privilege separation to database access
Adrienne Porter Felt,Matthew Finifter,Joel Weinberger,David Wagner +3 more
- pp 416-422
TLDR
A system called Diesel is constructed, which implements data separation by intercepting database queries and applying modules' restrictions to the queries, and is evaluated on three widely-used applications: Drupal, JForum, and WordPress.Abstract:
Database-backed applications typically grant complete database access to every part of the application. In this scenario, a flaw in one module can expose data that the module never uses for legitimate purposes. Drawing parallels to traditional privilege separation, we argue that database data should be subject to limitations such that each section of code receives access to only the data it needs. We call this data separation. Data separation defends against SQL-based errors including buggy queries and SQL injection attacks and facilitates code review, since a module's policy makes the extent of its database access explicit to programmers and code reviewers. We construct a system called Diesel, which implements data separation by intercepting database queries and applying modules' restrictions to the queries. We evaluate Diesel on three widely-used applications: Drupal, JForum, and WordPress.read more
Citations
More filters
Book ChapterDOI
Minimizing Databases Attack Surface Against SQL Injection Attacks
TL;DR: This paper demonstrates a methodology for identifying automatically SQL statements on a given database application, and introduces a runtime environment for enforcing the randomization and de-randomization mechanism in a completely transparent way, without requiring access to its source code.
Proceedings ArticleDOI
Scooter & Sidecar: a domain-specific approach to writing secure database migrations
TL;DR: Scooter as mentioned in this paper is a domain-specific language for expressing schema and policy migrations, and an associated SMT-based verifier (sidecar) which ensures that migrations are secure as the application evolves.
Dissertation
Detection and prevention of logic attacks against web applications through black-box analysis
TL;DR: This dissertation presents several techniques for automatically deriving the application logic specification by observing and extracting patterns from the interactions between the application and users, as well as the database, and leverage the inferred logic specification for both runtime detection of logic attacks and discovery of logic vulnerabilities within web applications.
Proceedings Article
CRYPTSERVER: strong data protection in commodity LAMP servers.
TL;DR: This work proposes a new architecture for web servers, called CryptServer, in which a small amount of application code that can compute over sensitive data is pre-determine and fixed, and provides strong defense against all malicious code that an attacker may run in the server software stack.
Book ChapterDOI
OSSM: The OLAP Security Specification Model
Ahmad Mousa Altamimi,Todd Eavis +1 more
TL;DR: An Object Oriented Security Model (OSSM) is presented that has been specifically designed for the specification of security policies within OLAP environments and can be used by the associated security policy engine to transparently and consistently propagate constraints across all relevant levels of dimension hierarchies.
References
More filters
Journal ArticleDOI
The protection of information in computer systems
TL;DR: In this article, the authors explore the mechanics of protecting computer-stored information from unauthorized use or modification, focusing on those architectural structures-whether hardware or software-that are necessary to support information protection.
A Classification of SQL-Injection Attacks and Countermeasures
TL;DR: An extensive review of the different types of SQL injection attacks known to date is presented, including descriptions and examples of how attacks of that type could be performed and existing detection and prevention techniques against SQL injections.
Proceedings ArticleDOI
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks
TL;DR: A new technique using a model-based approach to detect illegal queries before they are executed on the database and was able to stop all of the attempted attacks without generating any false positives.
Journal ArticleDOI
Making information flow explicit in HiStar
TL;DR: HiStar is a new operating system designed to minimize the amount of code that must be trusted, which allows users to specify precise data security policies without unduly limiting the structure of applications.