Proceedings of the 2014 Symposium and Bootcamp on the Science of Security 2014
DOI: 10.1145/2600176.2600194
|View full text |Cite
|
Sign up to set email alerts
|

Type-specific languages to fight injection attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…Wyvern is able to prevent command injection vulnerabilities [3], and we now illustrate how the design of the Wyvern programming language is able to do it by looking specifically at SQL injections.…”
Section: Command Injection Defense In Wyvernmentioning
confidence: 99%
See 1 more Smart Citation
“…Wyvern is able to prevent command injection vulnerabilities [3], and we now illustrate how the design of the Wyvern programming language is able to do it by looking specifically at SQL injections.…”
Section: Command Injection Defense In Wyvernmentioning
confidence: 99%
“…Thus, any command language can be incorporated, guarding against any kind of command injection attack [3], not just SQL injections. In many prior extensible languages it was possible for language extensions to conflict.…”
Section: Command Injection Defense In Wyvernmentioning
confidence: 99%
“…To redress the balance, this paper considers the second category and looks at ideas and (anti)patterns in tackling injection flaws. One approach here is to address the problem at the level of the programming language, as proposed in Wyvern [1], with a so-called type-specific programming language that offers native support for input and output formats handled by programs. Another approach is the ongoing evolution in mechanisms to tackle XSS in applications [2].…”
Section: Introductionmentioning
confidence: 99%