Insecure context switching: inoculating regular expressions for survivability
WOOT'08 Proceedings of the 2nd conference on USENIX Workshop on offensive technologies
Hi-index | 0.00 |
Security boundaries are usually defined by a set of systems that are under a single administrative control. These boundaries occur at various levels, and vulnerabilities can become apparent as data “crosses” each one. In his inaugural column, the author looks at a range of boundaries from smaller to larger and presents vulnerabilites and potential solutions for each case.