skip to main content
10.1145/1655121.1655125acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Efficient character-level taint tracking for Java

Published: 13 November 2009 Publication History

Abstract

Over 80% of web services are vulnerable to attack, and much of the danger arises from command injection vulnerabilities. We present an efficient character-level taint tracking system for Java web applications and argue that it can be used to defend against command injection vulnerabilities. Our approach involves modification only to Java library classes and the implementation of the Java servlets framework, so it requires only a one-time modification to the server without any subsequent modifications to a web application's bytecode or access to the web application's source code. This makes it easy to deploy our technique and easy to secure legacy web software. Our preliminary experiments with the JForum web application suggest that character-level taint tracking adds 0-15% runtime overhead.

References

[1]
W. Chang, B. Streiff, and C. Lin. Efficient and extensible security enforcement using dynamic data flow analysis. In Proceedings of the 15th ACM conference on Computer and communications security, pages 39--50. ACM New York, NY, USA, 2008.
[2]
B. Chess and J. West. Dynamic taint propagation: Finding vulnerabilities without attacking. Information Security Technical Report, 13(1):33--39, 2008.
[3]
A. Futoransky, E. Gutesman, and A. Waissbein. A dynamic technique for enhancing the security and privacy of web applications. Proc. Black Hat USA, 2007.
[4]
J. Grossman. WhiteHat website security statistics report, Aug. 2008. http://www.whitehatsec.com/home/assets/WPstats0808.pdf.
[5]
V. Haldar, D. Chandra, and M. Franz. Dynamic taint propagation for Java. In Annual Computer Security Applications Conference (ACSAC 2005), pages 303--311, 2005.
[6]
W. Halfond, A. Orso, and P. Manolios. WASP: Protecting web applications using positive tainting and syntax-aware evaluation. IEEE Transactions on Software Engineering (TSE), 34(1):65--81, 2008.
[7]
L. Lam and T. Chiueh. A general dynamic information flow tracking framework for security applications. In Annual Computer Security Applications Conference (ACSAC 2006), pages 463--472, 2006.
[8]
A. Nguyen-Tuong, S. Guarnieri, D. Greene, J. Shirley, and D. Evans. Automatically hardening web applications using precise tainting. In 20th IFIP International Informations Security Conference (SEC 2005), pages 295--307. Springer, 2005.
[9]
T. Pietraszek and C. Berghe. Defending against injection attacks through context-sensitive string evaluation. In Recent Advances in Intrusion Detection (RAID 2005), volume 3858 of Lecture Notes in Computer Science, page 124. Springer, 2006.
[10]
R. Sekar. An efficient black-box technique for defeating web application attacks. In Network and Distributed Systems Symposium (NDSS 2009), Feb. 2009.
[11]
Web Application Security Consortium. Web Application Security Statistics Project 2007. http://www.webappsec.org/projects/statistics/wasc_wass_2007.pdf.
[12]
W. Xu, S. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. In 15th USENIX Security Symposium, pages 121--136, August 2006.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SWS '09: Proceedings of the 2009 ACM workshop on Secure web services
November 2009
70 pages
ISBN:9781605587899
DOI:10.1145/1655121
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 November 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. dynamic taint tracking
  2. information flow
  3. java
  4. web applications

Qualifiers

  • Research-article

Conference

CCS '09
Sponsor:

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)0
Reflects downloads up to 06 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media