Title
Spinner: Automated Dynamic Command Subsystem Perturbation
Abstract
ABSTRACTInjection attacks have been a major threat to web applications. Despite the significant effort in thwarting injection attacks, protection against injection attacks remains challenging due to the sophisticated attacks that exploit the existing protection techniques' design and implementation flaws. In this paper, we develop Spinner, a system that provides general protection against input injection attacks, including OS/shell command, SQL, and XXE injection. Instead of focusing on detecting malicious inputs, Spinner constantly randomizes underlying subsystems so that injected inputs (e.g., commands or SQL queries) that are not properly randomized will not be executed, hence prevented. We revisit the design and implementation choices of previous randomization-based techniques and develop a more robust and practical protection against various sophisticated input injection attacks. To handle complex real-world applications, we develop a bidirectional analysis that combines forward and backward static analysis techniques to identify in-tended commands or SQL queries to ensure the correct execution of the randomized target program. We implement Spinner for the shell command processor and two different database engines(MySQL and SQLite) and in diverse programming languages including C/C++, PHP, JavaScript and Lua. Our evaluation results on 42real-world applications including 27 vulnerable ones show that it effectively prevents a variety of input injection attacks with low runtime overhead (around 5%).
Year
DOI
Venue
2021
10.1145/3460120.3484577
Computer and Communications Security
Keywords
DocType
Citations 
Command/SQL Injection, Input Randomization, Perturbation
Conference
0
PageRank 
References 
Authors
0.34
0
4
Name
Order
Citations
PageRank
Meng Wang100.34
Chijung Jung211.36
Ali Ahad310.68
Yonghwi Kwon455.17