Precise, dynamic information flow for database-backed applications
نویسندگان
چکیده
منابع مشابه
End-To-End Policy-Agnostic Security for Database-Backed Applications
Protecting sensitive data often requires implementing repeated secu rity checks and filters throughout a program. This task is especially error-prone in web programs, where data flows between applica tions and databases. To reduce the opportunity for privacy leaks, we present Jacqueline, a web framework that automatically enforces se curity policies that restrict where sensitive data may flo...
متن کاملRefining dependencies for information flow analysis of database applications
Preserving confidentiality of sensitive information in any computing system always remains a challenging issue. One such reason is improper coding of softwares which may lead to the disclosure of sensitive information to unauthorised users while propagating along the code during execution. Languagebased information flow security analysis has emerged as a promising technique to prove that progra...
متن کاملOptimizing database-backed applications with query synthesis Citation
Object-relational mapping libraries are a popular way for applications to interact with databases because they provide transparent access to the database using the same language as the application. Unfortunately, using such frameworks often leads to poor performance, as modularity concerns encourage developers to implement relational operations in application code. Such application code does no...
متن کاملEnsuring Authorized Updates in Multi-user Database-Backed Applications
Database-backed applications rely on access control policies based on views to protect sensitive data from unauthorized parties. Current techniques assume that the application’s database tables contain a column that enables mapping a user to rows in the table. This assumption allows database views or similar mechanisms to enforce per-user access controls. However, not all database tables contai...
متن کاملDynamic Information-Flow Analysis for Multi-threaded Applications
Information-flow analysis is one of the promising techniques to leverage the detection of software vulnerabilities and confidentiality breaches. However, in the context of multi-threaded applications running on multicore platforms, this analysis becomes highly challenging due to data races and inter-processor dependences. In this paper we first review some of the existing information-flow analy...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM SIGPLAN Notices
سال: 2016
ISSN: 0362-1340,1558-1160
DOI: 10.1145/2980983.2908098