Title
An empirical analysis of input validation mechanisms in web applications and languages
Abstract
Web applications have become an integral part of the daily lives of millions of users. Unfortunately, web applications are also frequently targeted by attackers, and attacks such as XSS and SQL injection are still common. In this paper, we present an empirical study of more than 7000 input validation vulnerabilities with the aim of gaining deeper insights into how these common web vulnerabilities can be prevented. In particular, we focus on the relationship between the specific programming language used to develop web applications and the vulnerabilities that are commonly reported. Our findings suggest that most SQL injection and a significant number of XSS vulnerabilities can be prevented using straight-forward validation mechanisms based on common data types. We elaborate on these common data types, and discuss how support could be provided in web application frameworks.
Year
DOI
Venue
2012
10.1145/2245276.2232004
SAC
Keywords
Field
DocType
deeper insight,straight-forward validation mechanism,input validation mechanism,web application framework,empirical analysis,input validation vulnerability,common data type,daily life,sql injection,common web vulnerability,web application,xss vulnerability,input validation,programming language,security,data type,empirical study
Web development,World Wide Web,Computer science,Web modeling,Web application security,Cross-site scripting,Web application,Web service,Secure coding,SQL injection
Conference
Citations 
PageRank 
References 
6
0.49
18
Authors
4
Name
Order
Citations
PageRank
Theodoor Scholte126210.67
William Robertson21762123.11
Davide Balzarotti32040113.64
Engin Kirda45386334.12