dc.contributor.author |
Adaimy, Ralph Elie. |
dc.date.accessioned |
2013-10-02T09:22:36Z |
dc.date.available |
2013-10-02T09:22:36Z |
dc.date.issued |
2012 |
dc.identifier.uri |
http://hdl.handle.net/10938/9558 |
dc.description |
Thesis (M.S.)--American University of Beirut, Department of Computer Science, 2012. |
dc.description |
Advisor : Dr. Wassim El Hajj, Assistant Professor, Computer Science--Committee Members : Dr. Haidar Safa, Associate Professor, Computer Science ; Dr. Hazem Hajj, Assistant Professor, Electrical Engineering. |
dc.description |
Includes bibliographical references (leaves 64-67) |
dc.description.abstract |
Huge amounts of data and personal information are being sent to and retrieved from web applications on daily basis. Every application has its own confidentiality and integrity policies. Violating these policies can have broad negative impact on the involved company’s financial status and enforcing them is very hard even for the developers with good security background. In this thesis, we propose a framework to enforce confidentiality and integrity policies in web applications. The proposed framework uses static techniques to enforce security-by-construction. It takes as input web application code and produces a report pinpointing the exact locations where the application’s confidentiality policies were violated. It uses an innovative idea which includes annotations at the database level and requires minimal effort from the developer. The framework includes the following steps: (1) annotating the attributes in the database tables with four security levels, (2) constructing the Program Dependence Graph (PDG) of the application, (3) extending the PDG to incorporate the database annotations producing an extended PDG (E-PDG), (4) designing and creating rules for the E-PDG to indicate insecure information flows, (5) traversing the E-PDG searching for any violations of the created rules, and (6) finally reporting the line numbers that caused the insecure flows. For testing, we compared our approach with JLift, a state-of-the-art type-based system approach to detect information leaks. Both approaches were run against custom made PHP web applications and publicly available applications downloaded from sourgeforge.net. The results show that our approach performs better than JLift in terms of accuracy and false alarms. |
dc.format.extent |
ix, 67 leaves : ill. (some col.) ; 30cm. |
dc.language.iso |
eng |
dc.relation.ispartof |
Theses, Dissertations, and Projects |
dc.subject.classification |
T:005799 AUBNO |
dc.subject.lcsh |
Computer software -- Security measures. |
dc.subject.lcsh |
Computer networks -- Security measures. |
dc.subject.lcsh |
Web applications. |
dc.subject.lcsh |
Computer security. |
dc.subject.lcsh |
Systems software. |
dc.subject.lcsh |
Computer systems. |
dc.title |
Mitigating information leakage in web applications at the deployment level |
dc.type |
Thesis |
dc.contributor.department |
American University of Beirut. Faculty of Arts and Sciences. Department of Computer Science. |