|
|
|
|
LEADER |
02597 am a22002773u 4500 |
001 |
67015 |
042 |
|
|
|a dc
|
100 |
1 |
0 |
|a Yip, Alexander
|e author
|
100 |
1 |
0 |
|a Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
|e contributor
|
100 |
1 |
0 |
|a Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
|e contributor
|
100 |
1 |
0 |
|a Zeldovich, Nickolai
|e contributor
|
100 |
1 |
0 |
|a Yip, Alexander
|e contributor
|
100 |
1 |
0 |
|a Wang, Xi
|e contributor
|
100 |
1 |
0 |
|a Zeldovich, Nickolai
|e contributor
|
100 |
1 |
0 |
|a Kaashoek, M. Frans
|e contributor
|
700 |
1 |
0 |
|a Wang, Xi
|e author
|
700 |
1 |
0 |
|a Zeldovich, Nickolai
|e author
|
700 |
1 |
0 |
|a Kaashoek, M. Frans
|e author
|
245 |
0 |
0 |
|a Improving application security with data flow assertions
|
260 |
|
|
|b Association for Computing Machinery,
|c 2011-11-14T19:19:13Z.
|
856 |
|
|
|z Get fulltext
|u http://hdl.handle.net/1721.1/67015
|
520 |
|
|
|a Resin is a new language runtime that helps prevent security vulnerabilities, by allowing programmers to specify application-level data flow assertions. Resin provides policy objects, which programmers use to specify assertion code and metadata; data tracking, which allows programmers to associate assertions with application data, and to keep track of assertions as the data flow through the application; and filter objects, which programmers use to define data flow boundaries at which assertions are checked. Resin's runtime checks data flow assertions by propagating policy objects along with data, as that data moves through the application, and then invoking filter objects when data crosses a data flow boundary, such as when writing data to the network or a file. Using Resin, Web application programmers can prevent a range of problems, from SQL injection and cross-site scripting, to inadvertent password disclosure and missing access control checks. Adding a Resin assertion to an application requires few changes to the existing application code, and an assertion can reuse existing code and data structures. For instance, 23 lines of code detect and prevent three previously-unknown missing access control vulnerabilities in phpBB, a popular Web forum application. Other assertions comprising tens of lines of code prevent a range of vulnerabilities in Python and PHP applications. A prototype of Resin incurs a 33% CPU overhead running the HotCRP conference management application.
|
520 |
|
|
|a Nokia Research
|
546 |
|
|
|a en_US
|
655 |
7 |
|
|a Article
|
773 |
|
|
|t Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles
|