skip to main content
10.1145/3077286.3077571acmconferencesArticle/Chapter ViewAbstractPublication Pagesacm-seConference Proceedingsconference-collections
research-article
Public Access

The Impact of Defensive Programming on I/O Cybersecurity Attacks

Published:13 April 2017Publication History

ABSTRACT

This paper presents principles of Defensive Programming and examines the growing concern that these principles are not effectively incorporated into Computer Science and related computing degree programs' curricula. To support this concern, Defensive Programming principles are applied to a case study - Cross-site Scripting cybersecurity attacks. This paper concludes that Defensive Programming plays an important role in preventing these attacks and should thus be more aggressively integrated into CS courses such as Programming, Algorithms, Databases, Computer Architecture and Organization, and Computer Networks.

References

  1. Robert Auger. 2011. Cross Site Scripting. (February 2011). Retrieved February 9, 2017 from http://projects.webappsec.org/w/page/13246920/Cross%20Site%20ScriptingGoogle ScholarGoogle Scholar
  2. Padraic Brady. Input Validation. (n.d). Retrieved February 6, 2017 from http://phpsecurity.readthedocs.io/en/latest/Input-Validation.htmlGoogle ScholarGoogle Scholar
  3. Mukesh Kumar Gupta, M. C. Govil, and Girdhari Singh. 2014. Static Analysis Approaches to Detect SQL Injection and Cross Site Scripting Vulnerabilities in Web Applications: A Survey. In International Conference on Recent Advances and Innovations in Engineering (ICRAIE). IEEE, 1--5.Google ScholarGoogle ScholarCross RefCross Ref
  4. DOI:Google ScholarGoogle Scholar
  5. Logan Kugler. 2017. How a Supervillain (or a Hacker in His Basement) Could Destroy the Internet. Communications of the ACM 59, 2 (2017), 18--20. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Dana Nourie and Mike McCloskey. 2002. Regular Expressions and the Java Programming Language. (April 2002). Retrieved February 7, 2017 from http://www.oracle.com/technetwork/articles/java/regex-1564923.htmlGoogle ScholarGoogle Scholar
  7. Linda Null. 2004. Integrating security across the computer science curriculum. Journal of Computing Sciences in Colleges 19, 5 (May 2004), 170--178. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Oracle Technology Network. Secure Coding Guidelines for Java SE. (n.d.). Retrieved February 4, 2017 from http://www.oracle.com/technetwork/java/seccodeguide-139067.html#5Google ScholarGoogle Scholar
  9. OWASP ASIDE Project. (n.d.). Retrieved February 2, 2017 from https://www.owasp.org/index.php/OWASP_ASIDE_ProjectGoogle ScholarGoogle Scholar
  10. Thomas H. Park, Brian Dorn, and Andrea Forte. 2015. An Analysis of HTML and CSS Syntax Errors in a Web Development Course. ACM Transactions on Computing Education (TOCE) -- Special Issue on Web Development 15, 1, 4 (March 2015). Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Kirti Randhe and Vishal Mogal. 2014. Defense against SQL Injection and Cross Site Scripting Vulnerabilities. International Journal of Science and Research (IJSR) 3, 11 (November 2014), 2198--2201. DOI: http://www.ijsr.net/archive/v3i11/T0NUMTQxNTIz.pdfGoogle ScholarGoogle Scholar
  12. Suman Saha. 2009. Consideration Points: Detecting Cross-Site Scripting. (IJCSIS) International Journal of Computer Science and Information Security 4, 1 & 2 (August 2009), 8 pages. DOI: https://arxiv.org/abs/0908.4188Google ScholarGoogle Scholar
  13. Frank Schindler. 2006. Coping with Security in Programming. Acta Polytechnica Hungarica 3, 2 (2006), 65--72.Google ScholarGoogle Scholar
  14. Antonin Steinhauser and François Gauthier. 2016. JSPChecker: Static Detection of Context-Sensitive Cross-Site Scripting Flaws in Legacy Web Applications. Proceeding of the 2016 ACM Workshop on Programming Languages and Analysis for Security, 57--68. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Sandeep D. Sukhdeve and Hemlata Channe. 2016. The Code Sanitizer: Regular Expression Based Prevention of Content Injection Attacks. International Journal of Computer Trends and Technology (IJCTT) 35, 1 (May 2016), 21--28.Google ScholarGoogle Scholar
  16. Jeff Williams, Jim Manico, and Neil Mattatall. 2017. XSS (Cross Site Scripting) Prevention Cheat Sheet. (February 2017). Retrieved February 9, 2017 from https://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_SheetGoogle ScholarGoogle Scholar
  17. Marsha Zaidman. 2004. Teaching defensive programming in Java. Journal of Computing Sciences in Colleges 19, 3 (January 2004), 33--43. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Jun Zhu, Jing Xie, Heather Richter Lipford, Bill and Chu. 2014. Supporting secure programming web applications through interactive static analysis. Journal of Advanced Research 50, 1 (July 2014), 449--462.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    ACM SE '17: Proceedings of the SouthEast Conference
    April 2017
    275 pages
    ISBN:9781450350242
    DOI:10.1145/3077286

    Copyright © 2017 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 13 April 2017

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    ACM SE '17 Paper Acceptance Rate21of34submissions,62%Overall Acceptance Rate178of377submissions,47%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader