skip to main content
10.1145/1636642.1636654acmconferencesArticle/Chapter ViewAbstractPublication PagessplashConference Proceedingsconference-collections
research-article

A security oriented program transformation to "add on" policies to prevent injection attacks

Published:19 October 2008Publication History

ABSTRACT

Topping the list of the most prominent attacks on applications [6] are various types of injection attacks. Malicious inputs that cause injection attacks are numerous; programmers fail to write checks for all attack patterns. We define a program transformation that allows a programmer to think in terms of rectification policies and automatically add these policies to convert unsafe data inputs to safe inputs. The security oriented program transformation applies to all classes of injection attacks, easing the burden of programmers who would otherwise have to manually write checks.

References

  1. Martin Fowler. Refactoring: Improving The Design of Existing Code. Object Technology Series. Addison-Wesley, June 1999. With contributions by Kent Beck, John Brant, Willima Opdyke, and Don Roberts.Google ScholarGoogle Scholar
  2. Erich Gamma, Richard Helm, Ralph Johnson, and John Vlissides. Design Patterns. Addison-Wesley, 1995.Google ScholarGoogle Scholar
  3. OWASP. Categories of injection attacks, 2008.Google ScholarGoogle Scholar
  4. Marcus J. Ranum. The six dumbest ideas in computer security. http://www.ranum.com/security/computer_security/editorials/dumb/, September 2005.Google ScholarGoogle Scholar
  5. Martin C. Rinard. Living in the comfort zone. In OOPSLA '07: Proceedings of the 22nd annual ACM SIGPLAN conference on Object oriented programming systems and applications, pages 611--622, New York, NY, USA, 2007. ACM. ISBN 978-1-59593-786-5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Andrew van der Stock, Jeff Williams, and Dave Wichers. OWASP Top 10 - The ten most critical web application security vulnerabilities - 2007 update, 2007.Google ScholarGoogle Scholar

Index Terms

  1. A security oriented program transformation to "add on" policies to prevent injection attacks

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          WRT '08: Proceedings of the 2nd Workshop on Refactoring Tools
          October 2008
          50 pages
          ISBN:9781605583396
          DOI:10.1145/1636642

          Copyright © 2008 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 19 October 2008

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate9of9submissions,100%

          Upcoming Conference

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader