Show simple item record

dc.contributor.authorDalton, Michael
dc.contributor.authorKozyrakis, Christos
dc.contributor.authorZeldovich, Nickolai
dc.date.accessioned2011-04-08T20:19:24Z
dc.date.available2011-04-08T20:19:24Z
dc.date.issued2009-08
dc.identifier.urihttp://hdl.handle.net/1721.1/62182
dc.description.abstractThis paper presents Nemesis, a novel methodology for mitigating authentication bypass and access control vulnerabilities in existing web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the appropriate credentials. Access control attacks occur when an access control check in the web application is incorrect or missing, allowing users unauthorized access to privileged resources such as databases and files. Such attacks are becoming increasingly common, and have occurred in many high-profile applications, such as IIS [10] and WordPress [31], as well as 14% of surveyed web sites [30]. Nevertheless, none of the currently available tools can fully mitigate these attacks. Nemesis automatically determines when an application safely and correctly authenticates users, by using Dynamic Information Flow Tracking (DIFT) techniques to track the flow of user credentials through the application’s language runtime. Nemesis combines authentication information with programmer-supplied access control rules on files and database entries to automatically ensure that only properly authenticated users are granted access to any privileged resources or data. A study of seven popular web applications demonstrates that a prototype of Nemesis is effective at mitigating attacks, requires little programmer effort, and imposes minimal runtime overhead. Finally, we show that Nemesis can also improve the precision of existing security tools, such as DIFT analyses for SQL injection prevention, by providing runtime information about user authentication.en_US
dc.description.sponsorshipNational Science Foundation (U.S.) (Award 0546060) (Award 0701607)en_US
dc.language.isoen_US
dc.publisherUSENIX Associationen_US
dc.relation.isversionofhttp://www.usenix.org/events/sec09/tech/full_papers/dalton.pdfen_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alike 3.0en_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/3.0/en_US
dc.sourceMIT web domainen_US
dc.titleNemesis: Preventing Authentication & [and] Access Control Vulnerabilities in Web Applicationsen_US
dc.typeArticleen_US
dc.identifier.citationDalton, Michael, Christos Kozyrakis, and Nickolai Zeldovich. "Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications" USENIX UNIX Security Symposium, 2009.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratoryen_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.approverZeldovich, Nickolai
dc.contributor.mitauthorZeldovich, Nickolai
dc.relation.journalUSENIX UNIX Security Symposiumen_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
dspace.orderedauthorsDalton, Michael; Kozyrakis, Christos; Zeldovich, Nickolai
dc.identifier.orcidhttps://orcid.org/0000-0003-0238-2703
mit.licenseOPEN_ACCESS_POLICYen_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record