DocumentCode
2415995
Title
A Reflection-Based Framework for Content Validation
Author
Netland, Lars-Helge ; Espelid, Yngve ; Mughal, Khalid A.
Author_Institution
Dept. of Informatics, Bergen Univ.
fYear
2007
fDate
10-13 April 2007
Firstpage
697
Lastpage
706
Abstract
Attacks embedded in application-level data have become one of the most successful ways to circumvent software security. Skilled hackers capitalize on misplaced trust by concealing their malicious code within a seemingly innocuous stream of application data. In systems that do not perform the most elementary data checks, even unintentional user mistakes may cause a program to behave unexpectedly or crash. Any distributed software system with potentially untrustworthy sources of input should design and implement a mechanism to inspect application-level data. Such a solution should defend against mischievous attacks, as well as be robust enough to handle user slip-ups. Important steps in creating a successful validation regime include specifying what input to accept, and translating that policy into working code. Once in production, the validation routine must be adaptable in order to accommodate continuously changing requirements. This paper describes a reflection-based framework for content validation. It separates the inspection of data from the application logic, making it more feasible to construct and maintain a meaningful set of validation rules. The framework is flexible and can be integrated into almost any distributed object-oriented software system. Deployment only requires a basic understanding of XML and expects developers to create a trust model of their own software architecture
Keywords
XML; distributed processing; object-oriented programming; security of data; software architecture; software maintenance; XML; application logic; application-level data inspection; content validation; data check; distributed object-oriented software system; malicious code; reflection-based framework; software architecture; software maintainability; software security; trust model; Application software; Computer crashes; Computer hacking; Continuous production; Data security; Embedded software; Inspection; Logic; Robustness; Software systems;
fLanguage
English
Publisher
ieee
Conference_Titel
Availability, Reliability and Security, 2007. ARES 2007. The Second International Conference on
Conference_Location
Vienna
Print_ISBN
0-7695-2775-2
Type
conf
DOI
10.1109/ARES.2007.19
Filename
4159865
Link To Document