Command Injection Essence
Command Injection Essence
Abstract erated content. They are ubiquitous. For example, when a user
Web applications typically interact with a back-end database to re- logs on to his bank account through a web browser, he is using
trieve persistent data and then present the data to the user as dy- a web database application. These applications normally interact
namically generated output, such as HTML web pages. However, with databases to access persistent data. This interaction is com-
this interaction is commonly done through a low-level API by dy- monly done within a general-purpose programming language, such
namically constructing query strings within a general-purpose pro- as Java, through an application programming interface (API), such
gramming language, such as Java. This low-level interaction is ad as JDBC. A typical system architecture for applications is shown in
hoc because it does not take into account the structure of the output Figure 1. It is normally a three-tiered architecture, consisting of a
language. Accordingly, user inputs are treated as isolated lexical web-browser, an application server, and a back-end database server.
entities which, if not properly sanitized, can cause the web applica- Within the underlying general-purpose language, such an applica-
tion to generate unintended output. This is called a command injec- tion constructs database queries, often dynamically, and dispatches
tion attack, which poses a serious threat to web application security. these queries over an API to appropriate databases for execution. In
This paper presents the first formal definition of command injec- such a way, a web application retrieves and presents data to the user
tion attacks in the context of web applications, and gives a sound based on the user’s input as part of the application’s functionality;
and complete algorithm for preventing them based on context-free it is not intended to be simply an interface for arbitrary interaction
grammars and compiler parsing techniques. Our key observation is with the database.
that, for an attack to succeed, the input that gets propagated into However, if the user’s input is not handled properly, serious se-
the database query or the output document must change the in- curity problems can occur. This is because queries are constructed
tended syntactic structure of the query or document. Our definition dynamically in an ad hoc manner through low-level string manip-
and algorithm are general and apply to many forms of command ulations. This is ad hoc because databases interpret query strings
injection attacks. We validate our approach with S QL C HECK , an as structured, meaningful commands, while web applications often
implementation for the setting of SQL command injection attacks. view query strings simply as unstructured sequences of characters.
We evaluated S QL C HECK on real-world web applications with sys- This semantic gap, combined with improper handling of user input,
tematically compiled real-world attack data as input. S QL C HECK makes web applications susceptible to a large class of malicious at-
produced no false positives or false negatives, incurred low run- tacks known as command injection attacks.
time overhead, and applied straightforwardly to web applications We use one common kind of such attacks to illustrate the prob-
written in different languages. lem, namely the SQL command injection attacks (SQLCIA). An
SQLCIA injection attack occurs when a malicious user, through
Categories and Subject Descriptors D.2.4 [Software Engineer- specifically crafted input, causes a web application to generate and
ing]: Software/Program Verification—Reliability, Validation; D.3.1 send a query that functions differently than the programmer in-
[Programming Languages]: Formal Definitions and Theory— tended. For example, if a database contains user names and pass-
Syntax; F.4.2 [Mathematical Logic and Formal Languages]: Gram- words, the application may contain code such as the following:
mars and Other Rewriting Systems—Parsing, Grammar Types
query = "SELECT * FROM accounts WHERE name=’"
General Terms Algorithms, Experimentation, Languages, Relia- + request.getParameter("name")
bility, Security, Verification + "’ AND password=’"
+ request.getParameter("pass") + "’";
Keywords command injection attacks, web applications, gram-
mars, parsing, runtime verification This code generates a query intended to be used to authenticate a
user who tries to login to a web site. However, if a malicious user
1. Introduction enters “badguy” into the name field and “’OR’ a’=’a” into the
password field, the query string becomes:
Web applications are designed to present to any user with a web
browser a system-independent interface to some dynamically gen- SELECT * FROM accounts WHERE
name=’badguy’ AND password=’’ OR ’a’=’a’
whose condition always evaluates to true, and the user will bypass
the authentication logic.
Permission to make digital or hard copies of all or part of this work for personal or Command injection vulnerabilities continue to be discovered on
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full citation
large, real-world web applications [37], and the effects can be se-
on the first page. To copy otherwise, to republish, to post on servers or to redistribute vere. A recent news article [23] told about a major university whose
to lists, requires prior specific permission and/or a fee. student-application login page had a vulnerability much like the
POPL ’06 January 11–13, 2006, Charleston, South Carolina, USA. example shown above. Using appropriate input, an attacker could
Copyright c 2006 ACM 1-59593-02702/06/0001. . . $5.00. retrieve personal information about any of the hundreds of thou-
<%!
// database connection info
String dbDriver = "com.mysql.jdbc.Driver";
String strConn = "jdbc:mysql://"
+ "sport4sale.com/sport";
String dbUser = "manager";
String dbPassword = "athltpass";
3. Formal Descriptions
This section formalizes the notion of a web application, and, in that
context, formally defines an SQLCIA.
Figure 4. Parse trees for WHERE clauses of generated queries. Substrings from user input are underlined.
Figure 7. Parse tree fragments for an augmented query. Lemma 3.9 (Grammar Construction: Complete). Let G a be the
augmented grammar constructed from grammar G and set U. For
all P (Li1 M, . . . , Lin M) = q a ∈ L(G a ), P (i1 , . . . , in ) = q ∈ L(G)
To demonstrate this algorithm, consider the simplified grammar and q is not an SQLCIA.
for SQL’s SELECT statement in Figure 5. This is the grammar used
to generate the parse trees in Figure 4. If a security policy of Proof. Suppose for contradiction that there exists some hi1 , . . . ,
U = {cond, id, num, lit} is chosen, the result of Algorithm 3.6 in i such that P (Li1 M, . . . , Lin M) = q a ∈ L(G a ), but P (i1 , . . . ,
is shown in Figure 6. Suppose the queries shown in Figure 4 in ) = q is an SQLCIA. This implies that q a has a parse tree
were augmented. Using the augmented grammar, the parse tree for Tqaa from R a in G a . Because q is an SQLCIA, there exists some
the first query would look the same as Figure 4a, except that the substring LσM in q a where σ is not a valid syntactic form, i.e.,
subtrees shown in Figures 7a and 7b would be substituted in for the no node v in Tqaa both has σ as it descendant leaves and has
first and second input strings, respectively. No parse tree could be
v ∈ U . If v ∈ / U , then Algorithm 3.6 specifies no rule of the
constructed for the second augmented query.
form v a → LvM ∈ R a . Consequently Tqaa cannot exist, and this
A GLR parser generator [28] can be used to generate a parser
contradicts our initial assumption.
for an augmented grammar G a .
tiple web-programming languages, so we used the PHP and JSP first compiling one list of attack inputs, which were gleaned from
version of each to evaluate the applicability of our implementa- CERT/CC advisories and other sources that list vulnerabilities and
tion across different languages. Although the notion of “applica- exploits, and one list of legitimate inputs. The data type of each
bility across languages” is somewhat qualitative, it is significant: input was also recorded. Then each parameter in each URL was
the more language-specific an approach is, the less it is able to annotated with its type. Two lists of URLs were then generated,
address the broad problem of SQLCIAs (and command injections one ATTACK list and one L EGIT list, by substituting inputs from
in general). For example, an approach that involves using a modi- the respective lists into the URLs in a type consistent way. Each
fied interpreter [32, 31] is not easily applicable to a language like URL in the ATTACK list had at least one parameter from the list of
Java (i.e., JSP and servlets) because Sun is unlikely to modify its attack inputs, while each URL in the L EGIT list had only legitimate
Java interpreter for the sake of web applications. To the best of our parameters. Finally, the URLs were tested on unprotected versions
knowledge, this is the first evaluation in the literature run on web of the web applications to ensure that the ATTACK URLs did, in
applications written in different languages. fact, execute attacks and the L EGIT URLs resulted in normal, ex-
Table 1 lists the subjects, giving for each subject its name, a pected behavior.
brief description of its function, the number of lines of code in The machine used to perform the evaluation runs Linux kernel
the PHP and JSP versions, the number of pairs of meta-characters 2.4.27 and has a 2 GHz Pentium M processor and 1 GB of memory.
added, the number of input sites, the number of calls to S QL C HECK
added, and the number of points at which complete queries are 6.2 Results
generated. The number of pairs of meta-characters added was less Table 2 shows, for each web application, the number of attacks at-
than the number of input sites because in these applications, most tempted (using URLs from the ATTACK list) and prevented, the
input parameters were passed through a particular function, and number of legitimate uses attempted and allowed, and the mean
by adding a single pair of meta-characters in this function, many and standard deviation of times across all runs of S QL C HECK for
inputs did not need to be instrumented individually. For a similar that application. S QL C HECK successfully prevented all attacks and
reason, the number of added calls to S QL C HECK is less than the allowed all legitimate uses. Theorem 3.10 predicted this, but these
number of points at which completed queries are generated: In results provide some assurance that S QL C HECK was implemented
order to make switching DBMSs easy, a wrapper function was without significant oversight. Additionally, the timing results show
added around the database’s SELECT query function. Adding a that S QL C HECK is quite efficient. Round trip time over the Inter-
call to S QL C HECK within that wrapper ensures that all SELECT net varies widely, but 80–100ms is typical. Consequently, S QL -
queries will be checked. Calling S QL C HECK from the JSP versions C HECK’s overhead is imperceptible to the user, and is also reason-
requires a Java Native Interface (JNI) wrapper. We report both able for servers with heavier traffic.
figures to indicate approximately the numbers of checks that need In addition to the figures shown in Table 2, our experience using
to be added for web applications of this size that are less cleanly S QL C HECK provides experimental results. Even in the absence of
designed. For this evaluation, we added the meta-characters and the an automated tool for inserting meta-characters and calls to S QL -
calls to S QL C HECK manually; in the future, we plan to automate C HECK, this technique could be applied straightforwardly. Most
this task using a static flow analysis. existing techniques for preventing SQLCIAs either cannot make
In addition to real-world web applications, the evaluation syntactic guarantees (e.g., regular expression filters) or require a
needed real-world inputs. To this end we used a set of URLs tool with knowledge of the source language. For example, a type-
provided by Halfond and Orso. These URLs were generated by system based approach requires typing rules in some form for each
construct in the source language. As another example, a technique tle assumptions do not hold, as in the case of the second order at-
that generates automata for use in dynamic checking requires a tacks [2]. In the absence of a principled analysis to check these
string analyzer designed for the source language. Forgoing the use methods, security cannot be guaranteed.
of the string analyzer would require an appropriate automaton for
each query site to be generated manually, which most web appli- 7.2 Syntactic Structure Enforcement
cation programmers cannot/will not do. In contrast, a programmer Other techniques deal with input validation by enforcing that all
without a tool designed for the source language of his choice can input will take the syntactic position of literals. Bind variables and
still use S QL C HECK to prevent SQLCIAs. parameters in stored procedures can be used as placeholders for
literals within queries, so that whatever they hold will be treated
6.3 Discussions as literals and not as arbitrary code. SQLrand, a recently proposed
We now discuss some of our design decisions and limitations of the instruction set randomization for SQL in web applications, has a
current implementation. similar effect [4]. It relies on a proxy to translate instructions dy-
First, we used a single policy U for all test cases. In practice we namically, so SQL keywords entered as input will not reach the
expect that a simple policy will suffice for most uses. In general, a SQL server as keywords. The main disadvantages of such a system
unique policy can be defined for each pair of input site (by choosing are its complex setup and security of the randomization key. Hal-
a different pair of strings to serve as delimiters) and query site (by fond and Orso address SQL injection attacks through first building
generating an augmented grammar according to the desired policy a model of legal queries and then ensuring that generated queries
for each pair of delimiters). However, even if U were always chosen conform to this model via runtime monitoring [13], following a
to be V ∪ Σ, S QL C HECK would restrict the user input to syntactic similar approach to Wagner and Dean’s work on Intrusion Detec-
forms in the SQL language. In the case where user input is used tion Via Static Analysis [8]. The precision of this technique is sub-
in a comparison expression, the best an attacker can hope to do is ject to both the precision of the statically constructed model and the
to change the number of tuples returned; no statements that modify tokenizing technique used. Because how their model is generated,
the database, execute external code, or return columns other than user inputs are confined to statically defined syntactic positions.
those in the column list will be allowed. These techniques for enforcing syntactic structure do not extend
Second, because the check is based on parsing, it would be pos- to applications that accept or retrieve queries or query-fragments,
sible to integrate it into the DBMSs own parser. From a software such as those that retrieve stored queries from persistent storage
engineering standpoint, this does not seem to be a good decision. (e.g., a file or a database).
Web applications are often ported to different environments and in-
terface with different backend DBMS’s, so the security guarantees 7.3 Static and Runtime Checking
could be lost without the programmer realizing it. Many real-world web applications have vulnerabilities, even though
Finally, the test cases used for the evaluation were generated by measures such as those mentioned above are used. Vulnerabilities
an independant research group from real-world exploits. However, exist because of insufficiency of the technique, improper usage,
they were not written by attackers attempting to defeat the partic- incomplete usage, or some combination of these. Therefore, black-
ular security mechanism we used. In its current implementation, box testing tools have been built for web database applications.
our technique is vulnerable to an exhaustive search of the charac- One from the research community is called WAVES (Web Appli-
ter strings used as delimiters. This vulnerability can be removed by cation Vulnerability and Error Scanner) [14]. Several commercial
modifying the augmenting step: in addition to adding delimiters, products also exist, such as AppScan [33], WebInspect [38], and
it must check for the presence of the delimiters within the input ScanDo [17]. While testing can be useful in practice for finding vul-
string. If the delimiters occur, it must “escape” them by prepend- nerabilities, it cannot be used to make security guarantees. Thus,
ing them with some designated character. S QL C HECK must also be several techniques based on static analysis or runtime checking
modified so that first, its lexer will not interpret escaped delimiters have been proposed, most of which are based on the notion of
as delimiters, and second, it will remove the escaping character af- “taintedness,” similar to Perl’s “tainted mode” [40]. In particular,
ter parsing. there are two recent techniques using static analysis to track the
flow of untrusted input through a program: one based on a type
7. Related Work system [15] (similar to CQual [10]) and one based on a points-
to analysis [24] (using a precise points-to analysis for Java [43]
7.1 Input Filtering Techniques and policies specified in PQL [22, 26]). Both systems trust user
Improper input validation accounts for most security problems in filters, so they do not provide strong security guarantee. There is
database and web applications. Many suggested techniques for in- also recent work on runtime taint tracking [31, 32]. Pietraszek et al.
put validation are signature-based, including enumerating known suggest the use of meta-data for tracking the flow of input through
“bad” strings necessary for injection attacks, limiting the length of filters [32]. The closest work to ours is by Buehrer et al. [6]. They
input strings, or more generally, using regular expressions for fil- bound user input, and at the point where queries are sent, they re-
tering. An alternative is to alter inputs, perhaps by adding slashes place input by dummy literals and compare the parse trees of the
in front of quotes to prevent the quotes that surround literals from original query and the substituted query. In this case, a lexer would
being closed within the input (e.g., with PHP’s addslashes func- suffice for the check, since input substrings must be literals. We do
tion and PHP’s magic quotes setting, for example). Recent re- not address the question of completeness of usage (i.e., that all input
search efforts provide ways of systematically specifying and en- and query sites in the application source code are augmented and
forcing constraints on user inputs [5, 35, 36]. A number of com- checked, respectively). However, a web application programmer
mercial products, such as Sanctum’s AppShield [34] and Kavado’s using S QL C HECK need not make the false-positive/false-negative
InterDo [17], offer similar strategies. All of these techniques are tradeoffs that come with less rigorous approaches. Consquently, a
an improvement over unregulated input, but they all have weak- guarantee of completeness of usage for S QL C HECK implies that
nesses. None of them can say anything about the syntactic struc- SQLCIAs will not occur.
ture of the generated queries, and all may still admit bad input; for This work also relates to some recent work on security analysis
example, regular expression filters may be under-restrictive. More for Java applications. Naumovich and Centonze propose a static
significantly, escaping quotes can also be circumvented when sub- analysis technique to validate role-based access control policies
in J2EE applications [30]. They use a points-to analysis to deter- be to generate queries with “place-holder” user inputs. Then,
mine which object fields are accessed by which EJB methods to using a modified top-down parser, we will generate random in-
discover potential inconsistencies with the policy that may lead to puts that, when put in place of the place-holder inputs, form
security holes. Koved et al. study the complementary problem of syntactically correct queries. By feeding these randomly gener-
statically determining the access rights required for a program or a ated inputs to the web application, we will test S QL C HECK on
component to run on a client machine [21] using a dataflow analy- randomly generated yet meaningful queries.
sis [16, 18]. • Second, we plan to explore static analysis techniques to help
insert meta-characters and calls to S QL C HECK automatically.
7.4 Meta-Programming
The challenge will be to insert the meta-characters such that
To be put in a broader context, our research can be viewed as an no constant strings are captured and the control-flow of the
instance of providing runtime safety guarantee for meta-program- application will not be altered.
ming [39]. Macros are a very old and established meta-program- • Third, we plan to adapt our technique to other settings, for
ming technique; this was perhaps the first setting where the issue
example, to prevent cross-site scripting and XPath injection
of correctness of generated code arose. Powerful macro languages
attacks.
comprise a complete programming facility, which enable macro
programmers to create complex meta-programs that control macro-
expansion and generate code in the target language. Here, basic Acknowledgments
syntactic correctness, let alone semantic properties, of the gener-
ated code cannot be taken for granted, and only limited static check- We thank William Halfond and Alex Orso for providing legitimate
ing of such meta-programs is available. The levels of static check- and attack data for use in our evaluation. We are also grateful to Earl
ing available include none, syntactic, hygienic, and type checking. Barr, Christian Bird, Prem Devanbu, Kyung-Goo Doh, Alex Groce,
The widely used cpp macro pre-processor allows programmers to Ghassan Misherghi, Nicolas Rouquette, Bronis Supinski, Jeff Wu,
manipulate and generate arbitrary textual strings, and it provides no and the anonymous POPL reviewers for useful feedback on drafts
checking. The programmable syntax macros of Weise & Crew [42] of this paper.
work at the level of correct abstract-syntax tree (AST) fragments,
and guarantee that generated code is syntactically correct with re-
spect (specifically) to the C language. Weise & Crew macros are References
validated via standard type checking: static type checking guaran- [1] A. Aho, R. Sethi, and J. Ullman. Compilers, Principles, Techniques
tees that AST fragments (e.g., Expressions, Statements, etc.) are and Tools. Addison-Wesley, 1986.
used appropriately in macro meta-programs. Because macros in- [2] C. Anley. Advanced SQL Injection in SQL Server Applications. An
sert program fragments into new locations, they risk “capturing” NGSSoftware Insight Security Research (NISR) publication, 2002.
variable names unexpectedly. Preventing variable capture is called URL: http://www.nextgenss.com/papers/
hygiene. Hygienic macro expansion algorithms, beginning with advanced sql injection.pdf.
Kohlbecker et al. [20] provide hygiene guarantees. Recent work, [3] G. Bierman, E. Meijer, and W. Schulte. The essence of data access
such as that of Taha & Sheard [39], focuses on designing type in Cω . In The 19th European Conference on Object-Oriented
checking of object-programs into functional meta-programming Programming (ECOOP), 2005. To appear.
languages. There are also a number of proposals to provide type- [4] S. W. Boyd and A. D. Keromytis. SQLrand: Preventing SQL injection
safe APIs for dynamic SQL, including, for example Safe Query attacks. In International Conference on Applied Cryptography and
Objects [7], SQL DOM [27], and Xen [3, 29]. These proposals sug- Network Security (ACNS), LNCS, volume 2, 2004.
gest better programming models, but require programmers to learn [5] C. Brabrand, A. Møller, M. Ricky, and M. I. Schwartzbach.
a new API. In contrast, our approach does not introduce a new API, Powerforms: Declarative client-side form field validation. World
and it is suited to address the problems in the enormous number of Wide Web, 3(4), 2000.
programs that use existing database APIs. There are also research
[6] G. T. Buehrer, B. W. Weide, and P. A. Sivilotti. Using parse tree
efforts on type-checking polylingual systems [11, 25], but they do validation to prevent SQL injection attacks. In Proceedings of the
not deal with applications interfacing with databases such as web International Workshop on Software Engineering and Middleware
applications. (SEM) at Joint FSE and ESEC, Sept. 2005.
[7] W. R. Cook and S. Rai. Safe Query Objects: Statically Typed
8. Conclusions and Future Work Objects as Remotely Executable Queries. In Proceedings of the 27th
International Conference on Software Engineering (ICSE), 2005.
In this paper, we have presented the first formal definition of com-
mand injection attacks in web applications. Based on this defini- [8] D. Dean and D. Wagner. Intrusion detection via static analysis.
tion, we have developed a sound and complete runtime checking In Proceedings of the IEEE Symposium on Research in Security and
algorithm for preventing command injection attacks and produced Privacy, Oakland, CA, May 2001. IEEE Computer Society, Technical
Committee on Security and Privacy, IEEE Computer Society Press.
a working implementation of the algorithm. The implementation
proved effective under testing; it identified SQLCIAs precisely and [9] R. DeLine and M. Fähndrich. The Fugue protocol checker: Is your
incurred low runtime overhead. Our definition and algorithm are software baroque? Technical Report MSR-TR-2004-07, Microsoft
general and apply directly to other settings that produce structured, Research, Jan. 2004. http://research.microsoft.com/~maf/
Papers/tr-2004-07.pdf.
interpreted output.
Here are a few interesting directions for future work: [10] J. Foster, M. Fähndrich, and A. Aiken. A theory of type qualifiers. In
Proceedings of the ACM SIGPLAN Conference on Programming
• First, we plan to experiment with other ways to evaluate S QL - Language Design and Implementation (PLDI), pages 192–203,
C HECK . A natural choice will be to use S QL C HECK in some Atlanta, Georgia, May 1–4, 1999.
online web applications to expose S QL C HECK to the real world. [11] M. Furr and J. S. Foster. Checking type safety of foreign function
By logging the blocked and permitted queries, we hope to val- calls. In Proceedings of the ACM SIGPLAN 2005 Conference on
idate that it does not disrupt normal use and does not allow at- Programming Language Design and Implementation, pages 62–72,
tacks. A more novel approach to evaluating S QL C HECK will 2005.
[12] C. Gould, Z. Su, and P. Devanbu. Static checking of dynamically http://www.sanctuminc.com.
generated queries in database applications. In Proceedings of the [34] Sanctum Inc. AppShield 4.0 Whitepaper., 2002.
25th International Conference on Software Engineering (ICSE), URL: http://www.sanctuminc.com.
pages 645–654, May 2004.
[35] D. Scott and R. Sharp. Abstracting application-level web security. In
[13] W. G. Halfond and A. Orso. AMNESIA: Analysis and Monitoring World Wide Web, 2002.
for NEutralizing SQL-Injection Attacks. In Proceedings of 20th ACM
International Conference on Automated Software Engineering (ASE), [36] D. Scott and R. Sharp. Specifying and enforcing application-level
Nov. 2005. web security policies. IEEE Transactions on Knowledge and Data
Engineering, 15(4):771–783, 2003.
[14] Y.-W. Huang, S.-K. Huang, T.-P. Lin, and C.-H. Tsai. Web application
security assessment by fault injection and behavior monitoring. In [37] Security Focus. http://www.securityfocus.com.
World Wide Web, 2003. [38] SPI Dynamics. Web Application Security Assessment. SPI Dynamics
[15] Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D.-T. Lee, and S.-Y. Whitepaper, 2003.
Kuo. Securing web application code by static analysis and runtime [39] W. Taha and T. Sheard. Multi-stage programming with explicit
protection. In World Wide Web, pages 40–52, 2004. annotations. In Proceedings of the ACM SIGPLAN Symposium
[16] J. B. Kam and J. D. Ullman. Global data flow analysis and iterative on Partial Evaluation and Semantics-Based Program Manipulation
algorithms. Journal of the ACM, 23(1):158–171, 1976. (PEPM), 1997.
[17] Kavado, Inc. InterDo Vers. 3.0, 2003. [40] L. Wall, T. Christiansen, and R. L. Schwartz. Programming Perl (3rd
Edition). O’Reilly, 2000.
[18] G. A. Kildall. A unified approach to global program optimization.
In Proceedings of the 1st Annual Symposium on Principles of [41] G. Wassermann and Z. Su. An Analysis Framework for Security
Programming Languages (POPL), pages 194–206, Oct. 1973. in Web Applications. In Proceedings of the FSE Workshop on
Specification and Verification of Component-Based Systems (SAVCBS
[19] A. Klein. Blind XPath Injection. Whitepaper from Watchfire, 2005. 2004), pages 70–78, 2004.
[20] E. Kohlbecker, D. P. Friedman, M. Felleisen, and B. Duba. Hy- [42] D. Weise and R. Crew. Programmable syntax macros. In Proceedings
gienic macro expansion. In Conference on LISP and Functional of the ACM SIGPLAN Conference on Programming Language Design
Programming, 1986. and Implementation (PLDI), pages 156–165, 1993.
[21] L. Koved, M. Pistoia, and A. Kershenbaum. Access rights analysis [43] J. Whaley and M. S. Lam. Cloning-based context-sensitive pointer
for Java. In Proceedings of the 17th Annual Conference on Object- alias analysis using binary decision diagrams. In Proceedings of the
Oriented Programming, Systems, Languages, and Applications ACM SIGPLAN Conference on Programming Language Design and
(OOPSLA), pages 359–372, Nov. 2002. Implementation (PLDI), pages 131–144, June 2004.
[22] M. S. Lam, J. Whaley, V. B. Livshits, M. Martin, D. Avots, M. Carbin,
and C. Unkel. Context-sensitive program analysis as database queries.
In Proceedings of the ACM Conference on Principles of Database
Systems (PODS), June 2005.
[23] R. Lemos. Flawed USC admissions site allowed access to applicant
data, July 2005. http://www.securityfocus.com/news/11239.
[24] V. B. Livshits and M. S. Lam. Finding security vulnerabilities in Java
applications with static analysis. In Usenix Security Symposium, Aug.
2005. To appear.
[25] K. J. L. Mark Grechanik, William R. Cook. Static checking of
object-oriented polylingual systems. http://www.cs.utexas.
edu/users/wcook/Drafts/FOREL.pdf, Mar. 2005.
[26] M. Martin, V. B. Livshits, and M. S. Lam. Finding application
errors using PQL: a program query language. In 20th Annual ACM
Conference on Object-Oriented Programming, Systems, Languages,
oct 2005. To appear.
[27] R. A. McClure and I. H. Krüger. SQL DOM: compile time checking
of dynamic SQL statements. In Proceedings of the 27th International
Conference on Software Engineering, pages 88–96, 2005.
[28] S. McPeak. Elsa: An Elkhound-based C++ Parser, May 2005.
http://www.cs.berkeley.edu/~smcpeak/elkhound/.
[29] E. Meijer, W. Schulte, and G. Bierman. Unifying tables, objects and
documents, 2003.
[30] G. Naumovich and P. Centonze. Static analysis of role-based access
control in J2EE applications. SIGSOFT Software Engineering Notes,
29(5):1–10, 2004.
[31] A. Nguyen-Tuong, S. Guarnieri, D. Greene, J. Shirley, and D. Evans.
Automatically hardening web applications using precise tainting.
In Twentieth IFIP International Information Security Conference
(SEC’05), 2005.
[32] T. Pietraszek and C. V. Berghe. Defending against Injection Attacks
through Context-Sensitive String Evaluation. In Proceedings of
the 8th International Symposium on Recent Advances in Intrusion
Detection (RAID), Sept. 2005.
[33] Sanctum Inc. Web Application Security Testing-Appscan 3.5. URL: