Authors
Davide Balzarotti, Marco Cova, Vika Felmetsger, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, Giovanni Vigna
Publication date
2008/5/18
Conference
2008 IEEE Symposium on Security and Privacy (sp 2008)
Pages
387-401
Publisher
IEEE
Description
Web applications are ubiquitous, perform mission- critical tasks, and handle sensitive user data. Unfortunately, web applications are often implemented by developers with limited security skills, and, as a result, they contain vulnerabilities. Most of these vulnerabilities stem from the lack of input validation. That is, web applications use malicious input as part of a sensitive operation, without having properly checked or sanitized the input values prior to their use. Past research on vulnerability analysis has mostly focused on identifying cases in which a web application directly uses external input in critical operations. However, little research has been performed to analyze the correctness of the sanitization process. Thus, whenever a web application applies some sanitization routine to potentially malicious input, the vulnerability analysis assumes that the result is innocuous. Unfortunately, this might not be the case, as …
Total citations
20082009201020112012201320142015201620172018201920202021202220232024122640504439513947443026202920288
Scholar articles
D Balzarotti, M Cova, V Felmetsger, N Jovanovic… - 2008 IEEE Symposium on Security and Privacy (sp …, 2008