WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation
- 31 January 2008
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Software Engineering
- Vol. 34 (1) , 65-81
- https://doi.org/10.1109/tse.2007.70748
Abstract
Many software systems have evolved to include a Web-based component that makes them available to the public via the Internet and can expose them to a variety of Web-based attacks. One of these attacks is SQL injection, which can give attackers unrestricted access to the databases that underlie Web applications and has become increasingly frequent and serious. This paper presents a new highly automated approach for protecting Web applications against SQL injection that has both conceptual and practical advantages over most existing techniques. From a conceptual standpoint, the approach is based on the novel idea of positive tainting and on the concept of syntax-aware evaluation. From a practical standpoint, our technique is precise and efficient, has minimal deployment requirements, and incurs a negligible performance overhead in most cases. We have implemented our techniques in the Web application SQL-injection preventer (WASP) tool, which we used to perform an empirical evaluation on a wide range of Web applications that we subjected to a large and varied set of attacks and legitimate accesses. WASP was able to stop all of the otherwise successful attacks and did not generate any false positives.Keywords
This publication has 17 references indexed in Scilit:
- Using positive tainting and syntax-aware evaluation to counter SQL injection attacksPublished by Association for Computing Machinery (ACM) ,2006
- Precise alias analysis for static detection of web application vulnerabilitiesPublished by Association for Computing Machinery (ACM) ,2006
- The essence of command injection attacks in web applicationsPublished by Association for Computing Machinery (ACM) ,2006
- SQL DOM: compile time checking of dynamic SQL statementsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- AMNESIAPublished by Association for Computing Machinery (ACM) ,2005
- A Learning-Based Approach to the Detection of SQL AttacksPublished by Springer Nature ,2005
- Securing web application code by static analysis and runtime protectionPublished by Association for Computing Machinery (ACM) ,2004
- Web application security assessment by fault injection and behavior monitoringPublished by Association for Computing Machinery (ACM) ,2003
- Abstracting application-level web securityPublished by Association for Computing Machinery (ACM) ,2002
- The protection of information in computer systemsProceedings of the IEEE, 1975