ABSTRACT
Attacks embedded in application-level data have become one of the most successful ways to circumvent software security. Skilled hackers capitalize on misplaced trust by concealing their malicious code within a seemingly innocuous stream of application data. In systems that do not perform the most elementary data checks, even unintentional user mistakes may cause a program to behave unexpectedly or crash. Any distributed software system with potentially untrustworthy sources of input should design and implement a mechanism to inspect application-level data. Such a solution should defend against mischievous attacks, as well as be robust enough to handle user slip-ups. Important steps in creating a successful validation regime include specifying what input to accept, and translating that policy into working code. Once in production, the validation routine must be adaptable in order to accommodate continuously changing requirements. This paper describes a reflection-based framework for content validation. It separates the inspection of data from the application logic, making it more feasible to construct and maintain a meaningful set of validation rules. The framework is flexible and can be integrated into almost any distributed object-oriented software system. Deployment only requires a basic understanding of XML and expects developers to create a trust model of their own software architecture.
Index Terms
A Reflection-Based Framework for Content Validation
Recommendations
Content delivery networks: protection or threat?
ESORICS'09: Proceedings of the 14th European conference on Research in computer securityContent Delivery Networks (CDNs) are commonly believed to offer their customers protection against application-level denial of service (DoS) attacks. Indeed, a typical CDN with its vast resources can absorb these attacks without noticeable effect. This ...
A model-based attack injection approach for security validation
SIN '11: Proceedings of the 4th international conference on Security of information and networksCommunication systems are inherently buggy. These flaws can lead to security breaches in applications, which a malicious user could exploit to cause security failures in the system and, under certain circumstances, to take complete control of the ...
An Attack Based IMS Vulnerability Validate Platform
CMC '10: Proceedings of the 2010 International Conference on Communications and Mobile Computing - Volume 01This paper focuses on IMS vulnerability validation platform’s (IMS-VVP) design which combines the characteristics of the vulnerability of IMS. Attack based validate method is an accurate method and has an intuitive effect of the vulnerability discovery. ...





Comments