Preventing web application injections with complementary character coding

  • Authors:
  • Raymond Mui;Phyllis Frankl

  • Affiliations:
  • Polytechnic Institute of NYU, Brooklyn, NY;Polytechnic Institute of NYU, Brooklyn, NY

  • Venue:
  • ESORICS'11 Proceedings of the 16th European conference on Research in computer security
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Web application injection attacks, such as SQL injection and cross-site scripting (XSS) are major threats to the security of the Internet. Several recent research efforts have investigated the use of dynamic tainting to mitigate these threats. This paper presents complementary character coding, a new approach to character level dynamic tainting which allows efficient and precise taint propagation across the boundaries of server components, and also between servers and clients over HTTP. In this approach, each character has two encodings, which can be used to distinguish trusted and untrusted data. Small modifications to the lexical analyzers in components, such as the application code interpreter, the database management system, and (optionally) the web browser, allow them to become complement aware components, capable of using this alternative character coding scheme to enforce security policies aimed at preventing injection attacks, while continuing to function normally in other respects. This approach overcomes some weaknesses of previous dynamic tainting approaches. Notably, it offers a precise protection against persistent cross-site scripting attacks, as taint information is maintained when data is passed to a database and later retrieved by the application program. A prototype implementation with LAMP and Firefox is described. An empirical evaluation shows that the technique is effective on a group of vulnerable benchmarks and has low overhead.