6533b828fe1ef96bd1288e4b

RESEARCH PRODUCT

Stopping injection attacks with code and structured data

Ville Tirronen

subject

0301 basic medicineExploitComputer scienceCross-site scriptingCryptographyComputer securitycomputer.software_genreSQL injection03 medical and health sciences0302 clinical medicineSoftwareSQL injectionCode (cryptography)Cryptographic hash functionProof-carrying codeproof-carrying codetietoturvaSQLbusiness.industryXSS030104 developmental biologyinjection030220 oncology & carcinogenesiscryptographic hashbusinesscomputer

description

Injection attacks top the lists of the most harmful software vulnerabilities. Injection vulnerabilities are both commonplace and easy to exploit, which makes development of injection protection schemes important. In this article, we show how injection attacks can be practically eliminated through the use of structured data paired with cryptographic verification codes upon transmission. peerReviewed

http://urn.fi/URN:NBN:fi:jyu-201811264868