DocumentCode :
2799419
Title :
How to Counter Control Flow Tampering Attacks
Author :
Sharifi, Mohsen ; Zoroufi, Mohammad ; Saberi, Alireza
Author_Institution :
Iran Univ. of Sci. & Technol., Tehran
fYear :
2007
fDate :
13-16 May 2007
Firstpage :
815
Lastpage :
818
Abstract :
Nowadays more and more business activities are operated through web and the web plays a vital role in the interests of both businesses and their shareholders. However, the very good features of web such as its popularity, accessibility and openness, has provided more opportunities for security breaches by malicious users. That is why the rate of successful attacks on web and web applications are increasing. Many approaches have been introduced so far to reduce the rate of successful attacks of many kinds. Any technique that can detect these vulnerabilities and mitigate the security problems of web applications is useful to organizations seeking for more reliability from the security viewpoint. In this paper we first introduce the control flow tampering attack, which is one of the notable attacks against web applications, and present our approach for countering this attack using web application firewall.
Keywords :
Internet; authorisation; software reliability; Web application firewall; counter control flow tampering attacks; reliability; security breaches; Application software; Computer hacking; Counting circuits; Internet; Navigation; Security; Testing; Uniform resource locators; Web pages; Web server;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Systems and Applications, 2007. AICCSA '07. IEEE/ACS International Conference on
Conference_Location :
Amman
Print_ISBN :
1-4244-1030-4
Electronic_ISBN :
1-4244-1031-2
Type :
conf
DOI :
10.1109/AICCSA.2007.370726
Filename :
4231054
Link To Document :
بازگشت