skip to main content
tutorial

Gem #83: type-based security 2: validating the input

Published:22 February 2012Publication History
Skip Abstract Section

Abstract

Ada Gem #83 --- Ada's strong type system makes it quite convenient to check at compilation time that certain security properties are verified, for example that a tainted value is not used where a trusted one is expected, or that data is properly validated before being used in a sensitive context (think of SQL injection attacks). In the first Gem of this series of two, we discussed how to handle tainted data. In this Gem, we explain how to validate the input given to an SQL command. (For an amusing comic-strip description of what SQL injection is, see: http://xkcd.com/327/.

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access

  • Published in

    cover image ACM SIGAda Ada Letters
    ACM SIGAda Ada Letters  Volume 31, Issue 2
    August 2011
    62 pages
    ISSN:1094-3641
    DOI:10.1145/2148436
    Issue’s Table of Contents

    Copyright © 2012 Copyright is held by the owner/author(s)

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 22 February 2012

    Check for updates

    Qualifiers

    • tutorial
  • Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)1

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader
About Cookies On This Site

We use cookies to ensure that we give you the best experience on our website.

Learn more

Got it!