Dynamic Taint Propagation for Java
- 5 January 2006
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- No. 10639527,p. 303-311
- https://doi.org/10.1109/csac.2005.21
Abstract
Improperly validated user input is the underlying root cause for a wide variety of attacks on Web-based applications. Static approaches for detecting this problem help at the time of development, but require source code and report a number of false positives. Hence, they are of little use for securing fully deployed and rapidly evolving applications. We propose a dynamic solution that tags and tracks user input at runtime and prevents its improper use to maliciously affect the execution of the program. Our implementation can be transparently applied to Java classfiles, and does not require source code. Benchmarks show that the overhead of this runtime enforcement is negligible and can prevent a number of attacksKeywords
This publication has 5 references indexed in Scilit:
- Static analysis for securityIEEE Security & Privacy, 2004
- Securing web application code by static analysis and runtime protectionPublished by Association for Computing Machinery (ACM) ,2004
- ValgrindElectronic Notes in Theoretical Computer Science, 2003
- Improving security using extensible lightweight static analysisIEEE Software, 2002
- JFlowPublished by Association for Computing Machinery (ACM) ,1999