Securing web applications from injection and logic vulnerabilities: Approaches and challenges

G Deepa, PS Thilagam - Information and Software Technology, 2016 - Elsevier
Context: Web applications are trusted by billions of users for performing day-to-day activities.
Accessibility, availability and omnipresence of web applications have made them a prime …

A survey on server-side approaches to securing web applications

X Li, Y Xue - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
Web applications are one of the most prevalent platforms for information and service
delivery over the Internet today. As they are increasingly used for critical services, web …

Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones

W Enck, P Gilbert, S Han, V Tendulkar… - ACM Transactions on …, 2014 - dl.acm.org
Today's smartphone operating systems frequently fail to provide users with visibility into how
third-party applications collect and share their private data. We address these shortcomings …

CryptDB: Protecting confidentiality with encrypted query processing

RA Popa, CMS Redfield, N Zeldovich… - Proceedings of the …, 2011 - dl.acm.org
Online applications are vulnerable to theft of sensitive information because adversaries can
exploit software bugs to gain access to private data, and because curious or malicious …

Automatic Generation of {Data-Oriented} Exploits

H Hu, ZL Chua, S Adrian, P Saxena… - 24th USENIX Security …, 2015 - usenix.org
As defense solutions against control-flow hijacking attacks gain wide deployment, control-
oriented exploits from memory errors become difficult. As an alternative, attacks targeting …

Context-sensitive fencing: Securing speculative execution via microcode customization

M Taram, A Venkat, D Tullsen - Proceedings of the Twenty-Fourth …, 2019 - dl.acm.org
This paper describes context-sensitive fencing (CSF), a microcode-level defense against
multiple variants of Spectre. CSF leverages the ability to dynamically alter the decoding of …

CryptDB: processing queries on an encrypted database

RA Popa, CMS Redfield, N Zeldovich… - Communications of the …, 2012 - dl.acm.org
Theft of private information is a significant problem for online applications. For example, a
recent investigation found that at least eight million people's medical records were stolen as …

[PDF][PDF] Automating configuration troubleshooting with dynamic information flow analysis

M Attariyan, J Flinn - 9th USENIX Symposium on Operating Systems …, 2010 - usenix.org
Software misconfigurations are time-consuming and enormously frustrating to troubleshoot.
In this paper, we show that dynamic information flow analysis helps solve these problems by …

Building web applications on top of encrypted data using Mylar

RA Popa, E Stark, S Valdez, J Helfer… - … USENIX Symposium on …, 2014 - usenix.org
Web applications rely on servers to store and process confidential information. However,
anyone who gains access to the server (eg, an attacker, a curious administrator, or a …

Why does cryptographic software fail? A case study and open problems

D Lazar, H Chen, X Wang, N Zeldovich - … of 5th Asia-Pacific Workshop on …, 2014 - dl.acm.org
Mistakes in cryptographic software implementations often undermine the strong security
guarantees offered by cryptography. This paper presents a systematic study of cryptographic …