skip to main content
10.1145/3029806.3029813acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
short-paper

Aegis: Automatic Enforcement of Security Policies in Workflow-driven Web Applications

Published:22 March 2017Publication History

ABSTRACT

Organizations often expose business processes and services as web applications. Improper enforcement of security policies in these applications leads to business logic vulnerabilities that are hard to find and may have dramatic security implications. Aegis is a tool to automatically synthesize run-time monitors to enforce control-flow and data-flow integrity, as well as authorization policies and constraints in web applications. The enforcement of these properties can mitigate attacks, e.g., authorization bypass and workflow violations, while allowing regulatory compliance in the form of, e.g., Separation of Duty. Aegis is capable of guaranteeing business continuity while enforcing the security policies. We evaluate Aegis on a set of real-world applications, assessing the enforcement of policies, mitigation of vulnerabilities, and performance overhead.

References

  1. D. Balzarotti, M. Cova, V. Felmetsger, and G. Vigna. Multi-module vulnerability analysis of web-based applications. In Proc. of CCS, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. C. Bertolissi, D. R. dos Santos, and S. Ranise. Automated synthesis of run-time monitors to enforce authorization policies in business processes. In Proc. of ASIACCS, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. B. Braun, P. Gemein, H.P. Reiser, and J. Posegga. Control-flow integrity in web applications. In Proc. of ESSoS, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. S. Ceri, G. Gottlob, and L. Tanca. What You Always Wanted to Know About Datalog (And Never Dared to Ask). TKDE, 1(1):146--166, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. Cova, D. Balzarotti, V. Felmetsger, and G. Vigna. Swaddler: An approach for the anomaly-based detection of state violations in web applications. In Proc. of RAID, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. A. Doupé, L. Cavedon, C. Kruegel, and G. Vigna. Enemy of the state: A state-aware black-box web vulnerability scanner. In Proc. of USENIX Sec., 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. P. Gaubatz, W. Hummer, U. Zdun, and M. Strembeck. Enforcing entailment constraints in offline editing scenarios for real-time collaborative web documents. In Proc. of SAC, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. P. Gaubatz and U. Zdun. Supporting entailment constraints in the context of collaborative web applications. In Proc. of SAC, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. X. Li and Y. Xue. Block: a black-box approach for detection of state violation attacks towards web applications. In Proc. of ACSAC, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. X. Li, Y. Xue, and B. Malin. Detecting anomalous user behaviors in workflow-driven web applications. In Proc. of SRDS, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. T. Murata. Petri nets: properties, analysis and applications. Proc. of the IEEE, 77(4):541--580, 1989.Google ScholarGoogle ScholarCross RefCross Ref
  12. G. Pellegrino and D. Balzarotti. Toward black-box detection of logic flaws in web applications. In Proc. of NDSS, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  13. M. Schur, A. Roth, and A. Zeller. Mining workflow models from web applications. TSE, 41(12):1184--1201, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  14. A. Sudhodanan, A. Armando, L. Compagna, and R. Carbone. Attack patterns for black-box security testing of multi-party web applications. In Proc. of NDSS, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  15. F. Sun, L. Xu, and Z. Su. Static detection of access control vulnerabilities in web applications. In Proc. of USENIX Sec., 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. G. Terracina, N. Leone, V. Lio, and C. Panetta. Experimenting with recursive queries in database and logic programming systems. Theory Pract. Log. Program., 8(2):129--165, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. W.M.P. van der Aalst. Process Mining. Springer, 2011.Google ScholarGoogle Scholar
  18. Q. Wang and N. Li. Satisfiability and resiliency in workflow authorization systems. TISSEC, 13(4):40:1--40:35, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. M. Weske. Business Process Management. Springer, 2007.Google ScholarGoogle Scholar
  20. L. Xing, Y. Chen, X. Wang, and S. Chen. Integuard: Toward automatic protection of third-party web service integrations. In Proc. of NDSS, 2013.Google ScholarGoogle Scholar

Index Terms

  1. Aegis: Automatic Enforcement of Security Policies in Workflow-driven Web Applications

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CODASPY '17: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy
          March 2017
          382 pages
          ISBN:9781450345231
          DOI:10.1145/3029806

          Copyright © 2017 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 22 March 2017

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • short-paper

          Acceptance Rates

          CODASPY '17 Paper Acceptance Rate21of134submissions,16%Overall Acceptance Rate149of789submissions,19%

          Upcoming Conference

          CODASPY '24

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader