Precise, dynamic information flow for database-backed applications

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

End-To-End Policy-Agnostic Security for Database-Backed Applications

Protecting sensitive data often requires implementing repeated secu­ rity checks and filters throughout a program. This task is especially error-prone in web programs, where data flows between applica­ tions and databases. To reduce the opportunity for privacy leaks, we present Jacqueline, a web framework that automatically enforces se­ curity policies that restrict where sensitive data may flo...

متن کامل

Refining dependencies for information flow analysis of database applications

Preserving confidentiality of sensitive information in any computing system always remains a challenging issue. One such reason is improper coding of softwares which may lead to the disclosure of sensitive information to unauthorised users while propagating along the code during execution. Languagebased information flow security analysis has emerged as a promising technique to prove that progra...

متن کامل

Optimizing database-backed applications with query synthesis Citation

Object-relational mapping libraries are a popular way for applications to interact with databases because they provide transparent access to the database using the same language as the application. Unfortunately, using such frameworks often leads to poor performance, as modularity concerns encourage developers to implement relational operations in application code. Such application code does no...

متن کامل

Ensuring Authorized Updates in Multi-user Database-Backed Applications

Database-backed applications rely on access control policies based on views to protect sensitive data from unauthorized parties. Current techniques assume that the application’s database tables contain a column that enables mapping a user to rows in the table. This assumption allows database views or similar mechanisms to enforce per-user access controls. However, not all database tables contai...

متن کامل

Dynamic Information-Flow Analysis for Multi-threaded Applications

Information-flow analysis is one of the promising techniques to leverage the detection of software vulnerabilities and confidentiality breaches. However, in the context of multi-threaded applications running on multicore platforms, this analysis becomes highly challenging due to data races and inter-processor dependences. In this paper we first review some of the existing information-flow analy...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM SIGPLAN Notices

سال: 2016

ISSN: 0362-1340,1558-1160

DOI: 10.1145/2980983.2908098