Security analysis of XML, XML usage and XML parsing

被引:0
|
作者
Blyth, A [1 ]
Cunliffe, D [1 ]
Sutherland, I [1 ]
机构
[1] Univ Glamorgan, Sch Comp, Pontypridd CF37 1DL, M Glam, Wales
关键词
XML; XML parsing; domain object models; electronic commerce; information security; information integrity and protection;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Web-based applications greatly increase the availability of information and the ability of people to access and share information in a collaborative environment. Organisations can only truly make use of this technology to create a competitive advantage if they can trust the technology to distribute and mediate information in a safe and secure manner. The Web was not designed with security in mind and the use of XML as a vehicle for marking up information and mediating information flows does not directly support the imposition Of a security architecture to manage the security of collaborative information sharing and dissemination. The adoption of XML as the vehicle for electronic commerce has created an environment where XML is now a core technology to most organisations, yet most organisations are relying on off-the-shelf solutions to parsing and manipulating it. In his paper we will examine how XML and XML parsers can be attacked and used to modify, and enter false or misleading, information relating to an electronic transaction. The attack scenarios will be divided into five categories: DTD, Document Corruption, single-node, multi-node and back-end systems. For each attack type we will explore how the attack is perpetrated and what, if any, countermeasures exist to mitigate the attacks.
引用
收藏
页码:494 / 505
页数:12
相关论文
共 50 条
  • [1] Parsing XML
    Cox, D
    [J]. DR DOBBS JOURNAL, 2001, 26 (01): : 96 - +
  • [2] Parsing XML
    Weidenfeller, T
    [J]. DR DOBBS JOURNAL, 2001, 26 (05): : 10 - 10
  • [3] XML Schema in XML Documents with Usage Control
    Sun, Lili
    Li, Yan
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (10): : 170 - 177
  • [4] XML and security
    Selkirk, A
    [J]. BT TECHNOLOGY JOURNAL, 2001, 19 (03) : 23 - 34
  • [5] Analysis and Comparative Research of XML Parsing Technology
    Jiang, Hui
    Li, Yujie
    [J]. PROCEEDINGS OF 2018 IEEE 4TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2018), 2018, : 217 - 221
  • [6] XML PROCESSING. NO PARSING
    Guseynov, Yevgeniy
    [J]. WEBIST 2009: PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES, 2009, : 81 - 84
  • [7] A parallel approach to XML parsing
    Lu, Wei
    Chiu, Kenneth
    Pan, Yinfei
    [J]. 2006 7TH IEEE/ACM INTERNATIONAL CONFERENCE ON GRID COMPUTING, 2006, : 223 - +
  • [8] Beyond lazy XML parsing
    Farfan, Fernando
    Hristidis, Vagelis
    Rangaswami, Raju
    [J]. DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2007, 4653 : 75 - +
  • [9] XML security with binary XML for mobile Web services
    Kangasharju, Jaakko
    Lindholm, Tancred
    Tarkoma, Sasu
    [J]. INTERNATIONAL JOURNAL OF WEB SERVICES RESEARCH, 2008, 5 (03) : 1 - 19
  • [10] Experience XML security - The XML-Security plug-in for eclipse
    Schadow, D
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, 2005, 3677 : 321 - 329