AUB ScholarWorks

Mitigating information leakage in web applications at the deployment level

Show simple item record

dc.contributor.author Adaimy, Ralph Elie.
dc.date.accessioned 2013-10-02T09:22:36Z
dc.date.available 2013-10-02T09:22:36Z
dc.date.issued 2012
dc.identifier.uri http://hdl.handle.net/10938/9558
dc.description Thesis (M.S.)--American University of Beirut, Department of Computer Science, 2012.
dc.description Advisor : Dr. Wassim El Hajj, Assistant Professor, Computer Science--Committee Members : Dr. Haidar Safa, Associate Professor, Computer Science ; Dr. Hazem Hajj, Assistant Professor, Electrical Engineering.
dc.description Includes bibliographical references (leaves 64-67)
dc.description.abstract Huge amounts of data and personal information are being sent to and retrieved from web applications on daily basis. Every application has its own confidentiality and integrity policies. Violating these policies can have broad negative impact on the involved company’s financial status and enforcing them is very hard even for the developers with good security background. In this thesis, we propose a framework to enforce confidentiality and integrity policies in web applications. The proposed framework uses static techniques to enforce security-by-construction. It takes as input web application code and produces a report pinpointing the exact locations where the application’s confidentiality policies were violated. It uses an innovative idea which includes annotations at the database level and requires minimal effort from the developer. The framework includes the following steps: (1) annotating the attributes in the database tables with four security levels, (2) constructing the Program Dependence Graph (PDG) of the application, (3) extending the PDG to incorporate the database annotations producing an extended PDG (E-PDG), (4) designing and creating rules for the E-PDG to indicate insecure information flows, (5) traversing the E-PDG searching for any violations of the created rules, and (6) finally reporting the line numbers that caused the insecure flows. For testing, we compared our approach with JLift, a state-of-the-art type-based system approach to detect information leaks. Both approaches were run against custom made PHP web applications and publicly available applications downloaded from sourgeforge.net. The results show that our approach performs better than JLift in terms of accuracy and false alarms.
dc.format.extent ix, 67 leaves : ill. (some col.) ; 30cm.
dc.language.iso eng
dc.relation.ispartof Theses, Dissertations, and Projects
dc.subject.classification T:005799 AUBNO
dc.subject.lcsh Computer software -- Security measures.
dc.subject.lcsh Computer networks -- Security measures.
dc.subject.lcsh Web applications.
dc.subject.lcsh Computer security.
dc.subject.lcsh Systems software.
dc.subject.lcsh Computer systems.
dc.title Mitigating information leakage in web applications at the deployment level
dc.type Thesis
dc.contributor.department American University of Beirut. Faculty of Arts and Sciences. Department of Computer Science.


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search AUB ScholarWorks


Browse

My Account