Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Karthick Jayaraman is active.

Publication


Featured researches published by Karthick Jayaraman.


international conference on software engineering | 2009

Automatic creation of SQL Injection and cross-site scripting attacks

Adam Kieyzun; Philip J. Guo; Karthick Jayaraman; Michael D. Ernst

We present a technique for finding security vulnerabilities in Web applications. SQL Injection (SQLI) and cross-site scripting (XSS) attacks are widespread forms of attack in which the attacker crafts the input to the application to access or modify user data and execute malicious code. In the most serious attacks (called second-order, or persistent, XSS), an attacker can corrupt a database so as to cause subsequent users to execute malicious code.


international conference on distributed computing systems | 2010

ESCUDO: A Fine-Grained Protection Model for Web Browsers

Karthick Jayaraman; Wenliang Du; Balamurugan Rajagopalan; Steve J. Chapin

Web applications are no longer simple hyperlinked documents. They have progressively evolved to become highly complex—web pages combine content from several sources (with varying levels of trustworthiness), and incorporate significant portions of client-side code. However, the prevailing web protection model, the same-origin policy, has not adequately evolved to manage the security consequences of this additional complexity. As a result, web applications have become attractive targets of exploitation. We argue that this disconnection between the protection needs of modern web applications and the protection models used by web browsers that manage those applications amounts to a failure of access control. In this paper, we present Escudo, a new web browser protection model designed based on established principles of mandatory access control. We describe our implementation of a prototype of Escudo in the Lobo web browser, and illustrate how web applications can use Escudo for securing their resources. Our evaluation results indicate that Escudo incurs low overhead. To support backwards compatibility, Escudo defaults to the same-origin policy for legacy applications.


DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy | 2010

Enforcing request integrity in web applications

Karthick Jayaraman; Grzegorz Lewandowski; Paul G. Talaga; Steve J. Chapin

A web application is constructed to process an intended sequence of requests. Failing to enforce the intended sequences can lead to request integrity (RI) attacks, wherein an attacker forces an application into processing an unintended request sequence. Cross-site-request forgeries (CSRF) and workflow violations are two classes of RI attacks. Enforcing the intended request sequences is essential for ensuring the integrity of the application. We describe a new approach for enforcing request integrity in a web application, and its implementation in a tool called BAYAWAK. Under our approach, the intended request sequences of an application are specified as a security policy, and a framework-level method enforces the security policy strictly and transparently without requiring changes in the applications source code. Our approach can be compared to operating system (OS) support for access control--access control is not built into the application, but based on OS level policy settings. We evaluated BAYAWAK using nine open source web applications. Our results indicate that our approach is effective against request integrity attacks and incurs negligible overhead.


new security paradigms workshop | 2011

Position paper: why are there so many vulnerabilities in web applications?

Wenliang Du; Karthick Jayaraman; Xi Tan; Tongbo Luo; Steve J. Chapin

As the Web has become more and more ubiquitous, the number of attacks on web applications have increased substantially. According to a recent report, over 80 percent of web applications have had at least one serious vulnerability. This percentage is alarmingly higher than traditional applications. Something must be fundamentally wrong in the web infrastructure. Based on our research, we have formulated the following position: when choosing the stateless framework for the Web, we ignored a number of security properties that are essential to applications. As a result, the Trusted Computing Base(TCB) of the Web has significant weaknesses. To build secure stateful applications on top of a weakened TCB, developers have to implement extra protection logic in their web applications, making development difficult and error prone, and thereby causing a number of security problems in web applications. In this paper, we will present evidence, justification, and in-depth analysis to support this position.


Proceedings of the 16th Conference on Pattern Languages of Programs | 2009

Modeling user interactions for (fun and) profit: preventing request forgery attacks on web applications

Karthick Jayaraman; Paul G. Talaga; Grzegorz Lewandowski; Steve J. Chapin; Munawar Hafiz

The goal of a web-request forgery attacker is to manipulate the intended workflow of a web application. Applications that fail to enforce the designer-intended interactions are vulnerable to this type of attack. This paper proposes a systematic methodology for designing web applications to strictly enforce the designer-intended interactions. Our approach captures workflow using the Web DFA model and applies four design patterns to strictly enforce the intended interactions. We argue that using patterns in conjunction with a Web DFA model produces web applications that are secure from request forgery attacks by construction; more-over, our mechanism could be useful in designing workflow-based applications in other domains.


mathematical methods models and architectures for network security systems | 2010

Credentials management for high-value transactions

Glenn S. Benson; Shiu-Kai Chin; Sean Croston; Karthick Jayaraman; Susan Older

Partner key management (PKM) is an interoperable credential management protocol for online commercial transactions of high value. PKM reinterprets traditional public key infrastructure (PKI) for use in high-value commercial transactions, which require additional controls on the use of credentials for authentication and authorization. The need for additional controls is met by the use of partner key practice statements (PKPS), which are machine-readable policy statements precisely specifying a banks policy for accepting and processing payment requests. As assurance is crucial for high-value transactions, we use an access-control logic to: (1) describe the protocol, (2) assure the logical consistency of the operations, and (3) to make the trust assumptions explicit.


nasa formal methods | 2009

jFuzz: A Concolic Whitebox Fuzzer for Java

Karthick Jayaraman; David Harvison; Vijay Ganesh; Adam Kiezun


arXiv: Cryptography and Security | 2011

ARBAC Policy for a Large Multi-National Bank

Karthick Jayaraman; Vijay Ganesh; Mahesh V. Tripunitara; Martin C. Rinard; Steve J. Chapin


Archive | 2008

Memento: A Framework for Hardening Web Applications

Karthick Jayaraman; Grzegorz Lewandowski; Steve J. Chapin


DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy | 2011

Re-designing the web's access control system

Wenliang Du; Xi Tan; Tongbo Luo; Karthick Jayaraman; Zutao Zhu

Collaboration


Dive into the Karthick Jayaraman's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Xi Tan

Syracuse University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Adam Kieyzun

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge