Modeling user interactions for (fun and) profit: preventing request forgery attacks on web applications

  • Authors:
  • Karthick Jayaraman;Paul G. Talaga;Grzegorz Lewandowski;Steve J. Chapin;Munawar Hafiz

  • Affiliations:
  • Syracuse University;Syracuse University;Syracuse University;Syracuse University;University of Illinois at Urbana-Champaign

  • Venue:
  • Proceedings of the 16th Conference on Pattern Languages of Programs
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

The goal of a web-request forgery attacker is to manipulate the intended workflow of a web application. Applications that fail to enforce the designer-intended interactions are vulnerable to this type of attack. This paper proposes a systematic methodology for designing web applications to strictly enforce the designer-intended interactions. Our approach captures workflow using the Web DFA model and applies four design patterns to strictly enforce the intended interactions. We argue that using patterns in conjunction with a Web DFA model produces web applications that are secure from request forgery attacks by construction; more-over, our mechanism could be useful in designing workflow-based applications in other domains.