scispace - formally typeset
Proceedings ArticleDOI

Diesel: applying privilege separation to database access

TLDR
A system called Diesel is constructed, which implements data separation by intercepting database queries and applying modules' restrictions to the queries, and is evaluated on three widely-used applications: Drupal, JForum, and WordPress.
Abstract
Database-backed applications typically grant complete database access to every part of the application. In this scenario, a flaw in one module can expose data that the module never uses for legitimate purposes. Drawing parallels to traditional privilege separation, we argue that database data should be subject to limitations such that each section of code receives access to only the data it needs. We call this data separation. Data separation defends against SQL-based errors including buggy queries and SQL injection attacks and facilitates code review, since a module's policy makes the extent of its database access explicit to programmers and code reviewers. We construct a system called Diesel, which implements data separation by intercepting database queries and applying modules' restrictions to the queries. We evaluate Diesel on three widely-used applications: Drupal, JForum, and WordPress.

read more

Content maybe subject to copyright    Report

Citations
More filters
Book ChapterDOI

Minimizing Databases Attack Surface Against SQL Injection Attacks

TL;DR: This paper demonstrates a methodology for identifying automatically SQL statements on a given database application, and introduces a runtime environment for enforcing the randomization and de-randomization mechanism in a completely transparent way, without requiring access to its source code.
Proceedings ArticleDOI

Scooter & Sidecar: a domain-specific approach to writing secure database migrations

TL;DR: Scooter as mentioned in this paper is a domain-specific language for expressing schema and policy migrations, and an associated SMT-based verifier (sidecar) which ensures that migrations are secure as the application evolves.
Dissertation

Detection and prevention of logic attacks against web applications through black-box analysis

Xiaowei Li
TL;DR: This dissertation presents several techniques for automatically deriving the application logic specification by observing and extracting patterns from the interactions between the application and users, as well as the database, and leverage the inferred logic specification for both runtime detection of logic attacks and discovery of logic vulnerabilities within web applications.
Proceedings Article

CRYPTSERVER: strong data protection in commodity LAMP servers.

TL;DR: This work proposes a new architecture for web servers, called CryptServer, in which a small amount of application code that can compute over sensitive data is pre-determine and fixed, and provides strong defense against all malicious code that an attacker may run in the server software stack.
Book ChapterDOI

OSSM: The OLAP Security Specification Model

TL;DR: An Object Oriented Security Model (OSSM) is presented that has been specifically designed for the specification of security policies within OLAP environments and can be used by the associated security policy engine to transparently and consistently propagate constraints across all relevant levels of dimension hierarchies.
References
More filters
Journal ArticleDOI

The protection of information in computer systems

TL;DR: In this article, the authors explore the mechanics of protecting computer-stored information from unauthorized use or modification, focusing on those architectural structures-whether hardware or software-that are necessary to support information protection.

A Classification of SQL-Injection Attacks and Countermeasures

TL;DR: An extensive review of the different types of SQL injection attacks known to date is presented, including descriptions and examples of how attacks of that type could be performed and existing detection and prevention techniques against SQL injections.
Proceedings ArticleDOI

AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks

TL;DR: A new technique using a model-based approach to detect illegal queries before they are executed on the database and was able to stop all of the attempted attacks without generating any false positives.
Journal ArticleDOI

Making information flow explicit in HiStar

TL;DR: HiStar is a new operating system designed to minimize the amount of code that must be trusted, which allows users to specify precise data security policies without unduly limiting the structure of applications.