Securing web applications from injection and logic vulnerabilities: Approaches and challenges
Context: Web applications are trusted by billions of users for performing day-to-day activities.
Accessibility, availability and omnipresence of web applications have made them a prime …
Accessibility, availability and omnipresence of web applications have made them a prime …
A survey on server-side approaches to securing web applications
Web applications are one of the most prevalent platforms for information and service
delivery over the Internet today. As they are increasingly used for critical services, web …
delivery over the Internet today. As they are increasingly used for critical services, web …
Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones
Today's smartphone operating systems frequently fail to provide users with visibility into how
third-party applications collect and share their private data. We address these shortcomings …
third-party applications collect and share their private data. We address these shortcomings …
CryptDB: Protecting confidentiality with encrypted query processing
Online applications are vulnerable to theft of sensitive information because adversaries can
exploit software bugs to gain access to private data, and because curious or malicious …
exploit software bugs to gain access to private data, and because curious or malicious …
Automatic Generation of {Data-Oriented} Exploits
As defense solutions against control-flow hijacking attacks gain wide deployment, control-
oriented exploits from memory errors become difficult. As an alternative, attacks targeting …
oriented exploits from memory errors become difficult. As an alternative, attacks targeting …
Context-sensitive fencing: Securing speculative execution via microcode customization
This paper describes context-sensitive fencing (CSF), a microcode-level defense against
multiple variants of Spectre. CSF leverages the ability to dynamically alter the decoding of …
multiple variants of Spectre. CSF leverages the ability to dynamically alter the decoding of …
CryptDB: processing queries on an encrypted database
Theft of private information is a significant problem for online applications. For example, a
recent investigation found that at least eight million people's medical records were stolen as …
recent investigation found that at least eight million people's medical records were stolen as …
[PDF][PDF] Automating configuration troubleshooting with dynamic information flow analysis
M Attariyan, J Flinn - 9th USENIX Symposium on Operating Systems …, 2010 - usenix.org
Software misconfigurations are time-consuming and enormously frustrating to troubleshoot.
In this paper, we show that dynamic information flow analysis helps solve these problems by …
In this paper, we show that dynamic information flow analysis helps solve these problems by …
Building web applications on top of encrypted data using Mylar
Web applications rely on servers to store and process confidential information. However,
anyone who gains access to the server (eg, an attacker, a curious administrator, or a …
anyone who gains access to the server (eg, an attacker, a curious administrator, or a …
Why does cryptographic software fail? A case study and open problems
Mistakes in cryptographic software implementations often undermine the strong security
guarantees offered by cryptography. This paper presents a systematic study of cryptographic …
guarantees offered by cryptography. This paper presents a systematic study of cryptographic …