Please use this identifier to cite or link to this item: https://www.um.edu.mt/library/oar/handle/123456789/92071
Title: A black-box, code-injection prevention mechanism for COTS applications
Authors: Borg, David (2012)
Keywords: SQL (Computer program language)
Web services
Penetration testing (Computer security)
Issue Date: 2012
Citation: Borg, D. (2012). A black-box, code-injection prevention mechanism for COTS applications (Bachelor's dissertation).
Abstract: Web application vulnerabilities such as SQL injection and cross-site scripting vulnerabilities account for a large number of all reported vulnerabilities, while recent trends show that such vulnerabilities are on the rise. Successful attacks targeting injection vulnerabilities allow an attacker to execute arbitrary code with the privileges of the web application, which raises several confidentiality and integrity concerns. Current defensive mechanisms generally require either: (a) source code access which is not always easily available, (b) binary instrumentation with generally high performance overheads, or (c) detectors with high false positives. Web development frame works tackle these vulnerabilities by providing developers with tools to build-in the necessary protection at development time. However, applications written for older frameworks as well as already deployed applications cannot benefit from these tools. The aim of this project is to build an efficient, black-box defensive mechanism which protects web applications with existing injection vulnerabilities from being exploited. Information flow techniques are utilised to identify untrusted information flows in order to reduce the false positive rate. A policy framework restricts these information flows and identifies attacks. Results show that this technique can achieve a very small false negative and false positive rate if the correct policies are used. A single false negative which could be interpreted as an attack in older browsers was identified. A small number of false positives occurred when executing benign requests designed to look similar to SQL injection attacks. Overall runtime overheads vary greatly depending on whether support for detecting stored cross-site scripting attacks is enabled.
Description: B.Sc. IT (Hons)(Melit.)
URI: https://www.um.edu.mt/library/oar/handle/123456789/92071
Appears in Collections:Dissertations - FacICT - 2012
Dissertations - FacICTCS - 2010-2015

Files in This Item:
File Description SizeFormat 
BSC(HONS)ICT_Borg, David_2012.PDF
  Restricted Access
8.57 MBAdobe PDFView/Open Request a copy


Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.