Security Overview of QR Codes
|
|
|
- Lizbeth Harper
- 10 years ago
- Views:
Transcription
1 Security Overview of QR Codes Kevin Peng, Harry Sanabria, Derek Wu, Charlotte Zhu Massachusetts Institute of Technology Computer and Network Security 1
2 Table of Contents ABSTRACT 3 INTRODUCTION 4 QR CODE SECURITY PROTOCOLS 6 Background 6 Encryption 6 Signing 8 Other Attempts 9 QR CODE SOCIAL EXPERIMENT 11 Background 11 Methodology 11 Results 13 Discussion 13 QR CODE READER BUG SEARCH 15 Background 15 Methodology 15 SPayD 16 ZXing 17 CONCLUSIONS 19 REFERENCES 20 2
3 ABSTRACT Quick Response codes are 2-dimensional barcodes that visually encode bits of information represented as black square dots placed on a white square grid. Because QR codes are a way to transmit information, this paper examines QR codes for security flaws that could pose a danger to the average user and presents potential fixes to these security flaws. We propose new security protocols for QR code creation that involve encoding bits that are encrypted or digitally signed via traditional security protocols. We then attempt to compare the efficacy of QR code phishing attempts to that of short URL phishing attempts using a social experiment. Finally, we perform a bug search on two existing QR code applications, the popular open-source QR code scanner ZXing and an open-source QR code payments library called SPayD. We successfully applied security standards to QR codes and produced various forms of secure QR codes. However, each comes at a cost of either space or computation time, and therefore should be used only when needed. The social experiment was inconclusive because not enough people followed either the QR code or the shortened URL. Lastly, the bug search showed that both scanners had vulnerabilities involving code injection, unauthorized actions, and information leaking. 3
4 INTRODUCTION Quick Response codes, commonly abbreviated as QR codes, started out as an extension of the standard UPC barcode commonly used in retail and production. Unlike a 1-D barcode, a QR code is a 2-D matrix code that conveys information by the arrangement of its dark and light elements in columns and rows [1]. The data in a QR code can be accessed by taking a picture of the QR code and processing it with a QR code reader. The QR code itself is simply an array of bits to be identified by a scanner. Bits are reserved for the scanner to be able to identify and orient the image, as well as for version and format information (Figure 1). The remaining bits are used to encode the message, and the specific amount of available space leftover is dependent on the version of the QR code, which indicates the number of bits per row/column, and the level of error correction, which introduces redundancy. The most information dense QR codes used today can store just under 3,000 bytes of raw data [2]. Figure 1. QR code structure [2] Capable of encoding the same amount of data in about one-tenth the space of traditional 1-D barcodes, QR codes present a much more space-efficient way of presenting scannable data. Initially invented for use in automotive factories in Japan, QR codes were used to programmatically identify and track car parts quickly in order to speed up production. However, they soon began to see more widespread use as convenient methods of sharing and transmitting data. Popular commercial uses of QR codes now include URL redirection, payment information exchange, and electronic flight tickets [3]. 4
5 With the increase in usage of QR codes in the general public, it is necessary to ensure that the data conveyed through the QR code is not harmful to the user. There are currently two major attack vectors for potential vulnerabilities: attacks on human interactions and automated attacks [2]. Attacks on human interactions rely on the fact that humans by themselves are unable to interpret what information is encoded in QR codes, and thus rely on QR code readers to decode the information. Since the information in the QR code is completely obfuscated, it is possible to trick and attack users via phishing, pharming, and other social engineering attacks by putting up fake QR codes. It is also possible to attack users by manipulating and exploiting existing QR code readers that users use via command injection or traditional buffer overflows [2]. Automated attacks often result from the assumption that the encoded information in QR codes is sanitized. However, it is known that QR codes themselves can easily be manipulated in order to change encoded information, potentially producing attacks on backend software. Without QR code input sanitation, it is possible to produce attacks such as SQL injection, command injection, and fraud. In this paper, we propose potential solutions to these QR code attacks. We introduce security protocols for QR codes that allow the QR code creator to protect the information stored in the QR code by encrypting it and allow the user to verify that the message was not previously tampered with. We also attempt to compare the effectiveness of a QR code phishing attempt to that of a short URL phishing attempt in order to see whether a user is more likely to inherently trust a QR code or not. Finally, we search through existing QR code software to find bugs because user input is left unsanitized. 5
6 QR CODE SECURITY PROTOCOLS Background A QR code is simply a string of bits visually encoded as black and white squares on a grid. In most uses of QR codes where the intent is to have maximum accessibility, such as the common URL redirection, there are no security standards. Therefore, anybody can read or write QR code messages with impunity. However, certain applications may require restricted access or verification of QR codes, and thus there is a need to design QR codes that meet various security specifications. In this section of the paper, we shall discuss the implementation of a few security standards for QR codes, their costs, and some examples of use cases for each. The first is a standard that allows the creator of a QR code to encrypt the message for a specific reader. The second is a standard that allows the reader to verify the origin of the QR code. Lastly, we shall discuss a few other attempts we made at security protocols, where they fall short, and what future work could be made in those areas. Encryption The first security standard for QR codes is Encrypted QR codes, or EQRs. We will propose two kinds of EQRs: Symmetric EQRs (SEQR) and Public Key EQRs (PKEQR). In SEQRs we use a symmetric encryption scheme where both the reader and the writer of the EQR share a secret key. The encryption scheme is extremely straightforward: encrypt the bits of the message using AES block cipher with the shared secret key. In PKEQRs we use the RSA public key encryption scheme combined with AES, using a public RSA key to encrypt the AES key and including the encrypted key in the message. The only thing to note with these two methods is that the error correction bits should correct errors on the encrypted message, not the message itself, in order to avoid leaking information of the original message. This is not the first time SEQRs have been done; Google did an experiment involving SEQRs being used for login in 2011 [4]. Their method is the same as our first use case, namely using a QR code reader on a verified mobile device to verify another device. The idea is as follows. Assume a user has a mobile device on which they are logged in, which shares some secret key (e.g. a password) with Google, or any other service requiring login credentials. The user wishes to login on a new device, one on which he or she has not logged in before. Instead of typing in their password on the new device, which can put them at risk to keyloggers if they are doing this on a public computer, they are presented with an SEQR which can be read using only the secret key. The verified mobile device can then decrypt this SEQR, which contains a URL that, when hit by a request from the mobile device, logs in the user on the new device. 6
7 This URL is uniquely generated for the new device and expires within a few minutes. In this way, the user does not need to remember their password or type it in on untrusted devices. PKEQRs have not, as far as we have seen, been put into practice. This is probably because they have few applications, as commercial bar codes are mostly intended to get some data to a lot of people easily, not to encrypt data for only a single person. There are, however, non-commercial applications which can be found by going back to the QR code s roots as a identifier for parts in manufacturing plants. Some companies, such as Apple or Google, wish to keep their operations secret. When they receive a shipment of parts for a new, secret product, they are able to see if the packaging has been tampered with and inspected, but cannot stop intermediaries such as the shipping company to inspect the labeling on the shipment. Therefore, they are unable to keep their supply of parts a secret. The solution is to publish a public key, and have the part manufacturer label the shipment using PKEQRs, thereby hiding the information from third parties while still allowing the recipient to read the label efficiently, with their same QR code reading technology. As with any layer of security, these modifications to the QR code standard come at a cost. The encoded messages with SEQRs are of the same length of the original messages (as long as the message does not need to be padded), and therefore the only cost involved is the extra computation time when creating or reading the codes. Most of the uses of SEQRs don t need to be fast to write, but users usually desire the readers to produce a result quickly. Therefore, by using cipher modes like CBC where decryption is parallelizable, the decryption time can be minimized. Since these messages are usually only URLs a couple of bytes long, the decryption time should be negligible in most cases. Codes encrypted with PKEQRs, however, come at a greater cost, as encrypting messages this way adds additional data, namely the bits of the encrypted secret key, increasing the length of the sent message. Message length is extremely important in QR codes; longer messages require denser QR codes, which can make readers more error-prone. Even the smallest AES key size is 128 bits, or 16 QR code blocks. Therefore, a message that could be encrypted with a version 1 QR code (the most common QR code size, 21x21) must be encrypted with a version 3 PKQR code (29x29) [2], even at the lowest level of error correction! Therefore, in order to achieve the same level of readability, the new PKQR code would need to have nearly twice the area of the unencrypted QR code. This cost is infeasible for QR codes printed in magazines or newspapers where the publisher of the code is charged per square inch. Therefore, the use of the PKQR code must be limited to situations in which size is not a factor, such as the labelling of shipments of top secret parts. 7
8 Signing The next security standard we have devised is Signed QR codes, or SQRs. The purpose of this encoding is to allow the reader to verify the source of the SQR before any action is performed. If the verified source is trusted, the user can proceed to open the URL or perform any other action the QR code initiates without fear of a security breach. The SQR standard requires more modification than the previous encryption methods, as the code must contain the message, the signature, and a way to identify the public key of the signer. The new standard is described in the image below: Figure 2. SQR code standard for version 1. We have made several changes. First, there are now double the number of blocks devoted to relaying the message length, in order to also provide the signature length. Second, the signature bits are appended to the end of the message, and the error correction bits correct these signature bits as well. (Note that the length of the signature in this image is completely unrealistic, and only serves a demonstrative purpose.) Lastly, regardless of the QR code size, 24 bits adjacent to the existing formatting bits are devoted to a unique identifier for the signer, which can be used to retrieve the public key used to verify the signature. 24 bits allows for the unique identification of over 16 million signers; if this number is insufficient in the future the design can be scaled up and additional identification bits added. The scheme depends on a trusted third party that can be accessed at a known URL which can provide the public keys used to verify the SQRs. Like any certificate authority, this TTP assumes the burden of performing due diligence on those that it provides public keys for. A party wishing to produce an SQR needs to first consult the TTP and, after it is verified, publishing a RSA-PSS public key on the trusted 8
9 server. Then, using their RSA-PSS secret key, they sign the message they wish to send, append the signature to the message, and produce the QR code, adding the lengths of the message and signature as well as their unique identifier provided by the TTP. The reader for this QR code then requests the public key from the TTP using their identifier, and uses it to verify the message with traditional the RSA-PSS verification algorithm. This cryptosystem clearly has many practical applications. Companies, clubs, or groups of any kind can use the scheme to send trusted QR codes to their members. For example, a company can impose the rule that all QR codes in their offices must be SQRs signed by them, thereby enabling them to filter all the QR codes and avoiding problems caused by arbitrary URLs being opened on the company network. The user also has a lot to gain, as URLs and other data read from promotional posters or other public sources can be certified before being read, resulting in less phishing scams. As with SEQRs and PKEQRs, there are costs associated with SQRs. There is a significant overhead in terms of space: from 1 byte for the bits specifying the length of the signature, 3 bytes for the signature identifier, and usually 128 bytes for the signature. Therefore, as many as 261 additional bytes are needed beyond the message length, meaning a message that would use a version 1 QR would need a version 7 SQR code, which is over 4 times as large [2]. The size difference is large enough that it is probably preferable to not increase the size and sacrifice some readability. This is reasonable if using the highest level of error correction, as any loss in readability should be capable of being corrected in this case. Other Attempts We dedicated quite a bit of time thinking about alternative security protocols for QR codes that utilize the nature of the QR code itself instead of performing encryption operations on the bits. The schemes above are more viable simply because the algorithms involved are known, proven to work, and have been optimized over many years. However, our other efforts are, still worth noting in case future researchers wish to investigate further. One attempt made was for a proof of work QR code. In this scheme, which takes its idea from Bitcoin, a QR code contains a message, a series of random bits, and the hash of the concatenation of those two. The catch is that the bits containing the hash are located in regions usually reserved for fixed orientation patterns, namely the squares at the corners of the QR code. If the hash does not form the proper orientation patterns, the code will be unreadable. Much like how Bitcoin miners must compute for a long time to produce a hash ending in multiple 0 s, creators of the proof of work QR code must compute for a long time to produce a hash which is both valid for the encoded message and contains the correct orientation bits. 9
10 This is more space efficient than forcing the creator to produce a hash ending in 0 s and having them use the message space to contain the hash, as our method frees up more room for the message by moving much of the hash into normally reserved bits. We could not, however, come up with a scenario in which such a scheme would be useful. The second attempt we made was to take advantage of the optical nature of the QR code to produce a more space-efficient security encoding. Since QR codes are always read by an optical sensor, if given a high fidelity sensor, there is no reason to restrict the code to black or white binary squares. Shades of gray (or other colors) could conceivably be used, allowing each square to contain more than one bit of data. For example, assume two parties share a secret key and wish to share a secret message via QR code. The secret key could be used to generate a series of chromatic ranges, with each ranged assigned either 0 or 1, such that every color identifiable to the optical sensor can be identified as a 0 or a 1 (if the reader also knows the secret key). The writer of the QR code then encrypts the message by randomly selecting an appropriate color or shade for each bit. The reader, knowing the color assignments, just reads each color in and converts it to its assigned bit value. Any third party reading the QR code cannot distinguish which colors are a 1 and which are a 0. We did not follow through with this scheme for two reasons. First, it is difficult to get a value for the number of distinguishable colors in optical sensors, and the variation between sensors on different reader devices is enormous. Second, providing a cryptographically secure method for producing the color to bit assignments is troublesome, and there is no reason to believe that this method could be more secure than known algorithms such as RSA or AES. It could be interesting, however, for those interested in the topic to delve deeper and come up with new ways to take advantage of the optical nature of QR codes. 10
11 QR CODE SOCIAL EXPERIMENT Background Because QR codes are designed to be read by a machine, humans cannot easily read the encoded message with the naked eye. Thus, QR codes can often be used to hide their contents from the user. This makes them potent as a vector to redirect unsuspecting users to malicious websites, among other forms of attacks. In April 2012, GreenSQL CTO David Maman performed an experiment at the Infosec UK Security Conference to observe how many people would scan a QR code that could potentially redirect users to a malicious website [5]. He created a poster with a QR code and a logo of a real security company that advertised to just scan to win an ipad. Scanning the QR code redirected users to a webpage that contained just a harmless smiley face, but in theory, could have had more malicious intentions. Maman found that over three days, there were a total of 455 scans of the QR code: 142 via iphone, 211 via Android, 61 via Blackberrys, and 41 via unknown devices. Despite the security conference setting, Maman has demonstrate that a significant number of users fall prey to this attack. Building on Maman s results, we were interested to see how effective a malicious QR code redirection is compared to a malicious shortened URL misdirection. Both methods obscure the final malicious landing page, with QR codes using visual bits to encode the URL and shortened URLs using a different URL. However, the methods to reach the malicious landing page are different: a QR code requires a QR code scanner, a shortened URL requires the user to enter in that URL into a browser. We conducted this experiment to gain insight into which attack vector was more effective. Methodology We created two posters, one containing a TinyURL TM and one containing a QR code (Figure 3). The two posters advertised a chance to win a free 25 dollars in TechCASH, which can be used to purchase many goods and services across the MIT campus. Like the Maman poster, a bogus association (MIT RS Association) was mentioned on the poster to create more credibility. 11
12 Figure 3: TinyURL TM and QR code posters The TinyURL TM and QR code redirected to different URL s that visually looked identical, and displayed an apologetic message explaining that the 25 dollar TechCASH poster was a social experiment, and the only user data collected was the number of hits for each of the two posters. (A PHP script tallied the number of users that accessed the landing page via TinyURL TM and QR code.) The posters themselves were placed on the MIT campus at various high-traffic locations: Student Center (W20), Building 56, Building 66, and the Stata Center (32) (Figure 4). The TinyURL TM poster was sufficiently distanced from its corresponding QR code poster. To remain consistent with Maman s duration of the experiment, the number of accesses to the landing page was monitored for a period of 3 days. 12
13 Figure 4: Locations of Posters on MIT Campus: Each blue circle represents a corresponding pair of TinyURL TM and QR code posters, placed sufficiently far apart. Results After three days, 5 users accessed our malicious landing page via TinyURL TM and 3 users accessed the landing page via the QR code. Because the numbers were so low, no significant conclusion can be made to relate the two different vectors of attack. Discussion Although our data is not significant enough to draw any conclusions, we can postulate a few reasons why our numbers were so low. Our methodology did not allow us to collect the number of individuals that noticed the poster but did not elect to follow through with the TinyURL TM or QR code. Thus, we have no sense of the proportion of users that fell prey to the posters. Our low numbers could be due to low number of users noticing the posters or due to low participation rate. Assuming that our numbers are due to a low participation rate, there are several possible reasons why individuals did not choose to follow through the link. It is possible that the posters did not seem credible or enticing enough to persuade the user to use the TinyURL TM or QR code. It is also possible that the MIT community in general is more tech savvy and therefore more likely to avoid accessing websites via TinyURL TM or a QR code. There is also the possibility that more people would have scanned the QR code, if only more people had QR code scanners previously installed on their devices. Ultimately, the purpose of this experiment was to attempt to determine which attack vector was more effective in luring unsuspecting individuals. Because we collected 13
14 such low numbers, we cannot make a conclusion that one vector is more effective than the other. For future experiments, researchers should devise a way to collect the number of people who noticed the posters but did not follow through to the website. One possible way to do this is to gain permission to have a camera recording the number of people that actually see the posters. Thus, researchers can acquire the proportion of individuals that fell victim to such attacks. Furthermore, we could also collect more information of the demographic of the people who do fall prey, and observe which groups of individuals are more susceptible. In order for this collected data to have any significance, more samples need to be collected. This can be remedied by extending the experiment duration or finding higher traffic areas to display the posters. 14
15 QR CODE READER BUG SEARCH Background Because QR codes are translated via a QR code reader, security vulnerabilities may exist in the QR code software. A malicious QR code can take advantage of a poorly coded scanner via some sort of code injection. We performed a code review of two QR code readers: ZXing and an open-source Short Payment Descriptor (SPayD) reader. ZXing is a popular, generic QR code reader [6]. The SPayD code reader that we investigated provides a mechanism for exchanging payment information [7]. In most cases, readers go through three steps. First, they read in the raw bits in the correct order from the code, applying error correction as needed. Second, they (attempt to) interpret the contents, and put the raw data into a properly formatted object. Lastly, the reader performs an action related to the data, such as opening a URL. Usually the last step requires user confirmation before the action is performed. Methodology To search for vulnerabilities in the QR code readers, we focused on the critical points in this three step process, namely the second and third steps. In general, there are three common kinds of vulnerabilities possible, shown below. The first of these vulnerabilities can occur on the second step of the reading process, whereas the other two can occur on the third step. 1. Code Injection: Much like SQL injections that occur when SQL queries are made with user input text inserted into the query string, QR code readers are subject to data injection into their structured objects when they attempt to interpret the data of a QR code. If the contents of a QR code are inserted into a data structure with no sanitation done beforehand, a malicious party can create a QR code that injects arbitrary strings into a user s data structures, potentially causing harm to the user. We will see an example of this in the open source SPayD reader. 2. Unauthorized actions: If a reader incorrectly interprets the contents of a QR code and attempts to perform an action based on its wrong interpretation, there can be resulting security vulnerabilities. Since the device is performing what it interprets as the correct action and asks the user permission to perform that, the actual action performed can go unnoticed to the user. For example, a reader can misinterpret some plaintext data as a URI and issue a 15
16 system call to open the URI. The user will be asked permission to open a URL, but since the URI is just plaintext the system might actually do something else with it and not do anything else with the browser at all. We will see an example of when this can occur in the ZXing reader. 3. Information leaking: If a reader is incapable of performing actions on the QR code data itself, it often delegates this responsibility to other applications. This can lead to problems in the common publisher-subscriber model, because if the reader is not careful, it can leak the contents of the QR code to sniffers on the device. Of the three common problems, this one is the least severe, and is very platform based. We will see an example of this with ZXing where careless use of the Android publisher-subscriber model (Intents) leaks information on the device. SPayD Figure 5. In line 83, lack of sanitization in SpayD code reader allows the user to overwrite the AM field that was already set in line 80. The SPayD reader that we analyzed does not have any form of sanitation for the inputs that are provided. This, in essence, allows the user to enter variables as inputs and inject code to modify values. In the example shown in figure 5, the parameters 16
17 variable is inputted by the user. Note that the asterisk symbol is a delimiter for SPayDs, and does not denote multiplication. In line 80, the payment amount is set by retrieving metadata from the parameters variable. For example, let's assume the user originally set the amount to be 5. If the user also passes in a currency parameter equal to USD * AM: 1,000,000, the currency will be set equal to USD, as intended, but the user will also be able to overwrite the value of the amount to be 1,000,000 [7]. Here, code has been injected to modify fields in the payment string because there was no sanitation to prevent arbitrary values from being entered into the metadata of the parameters. ZXing ZXing does very little checking of the URI type that is provided through the QR code. Any exploit that can be provided through a browser can be directly passed through the QR code as a result. This, in the context of a mobile application, can lead to launching arbitrary phone applications or injecting Javascript in browsers ZXing attempts to filter out certain malicious attacks via regular expressions by requiring the URI to have either: 1. A period followed by an extension of at least length two 2. A transport protocol of length at least two followed by a colon in the expression ZXing also requires that the URI have no whitespace. If these conditions are not upheld, it will assume that the data presented in the QR code is plaintext rather than a URI. After After passing this stage, ZXing takes the given URI and only checks if the URI begins with or It assumes that all other transport protocols are legitimate and performs no sanitation on them. This mechanism bans simple attacks such as javascript;alert( You have won 1000 dollars! Just Click The Open Browser Button );, but by simply making a few changes to the code, ZXing will think that the Javascript call is a normal URI, and expose a vulnerability to any browser that doesn t also have its own defense mechanisms against URI attacks (Figure 6). Note additionally that ZXing doesn t immediately open a URI, but rather gives the user the option of looking at the exact text before proceeding. This allows provides experienced users with some security when receiving links from QR codes, but nevertheless, presents a vulnerability to novice users. 17
18 Figure 6: The left image depicts ZXing s attempt to filter out simple Javascript attacks, but with some slight modification, as seen on the right, vulnerabilities are still present. Figure 7: Opening the URI from the right half of figure in the browser. ZXing also is vulnerable to intent sniffing. When processing this URI, ZXing constructs a new implicit intent using a global action, Intent.ACTION_VIEW [6]. Other applications that filter for the same implicit intent can retrieve the same data from this intent. Moreover, Intent.ACTION_VIEW is a common action that is used by many Android applications. Since any other application that has an event listener for this action can obtain information about the URI that is read from the QR code, ZXing should first send an a global implicit intent requesting which application can open the URI without actually providing the data, and then send the data to the correct application with an explicit Intent. Other applications cannot eavesdrop on explicit intents, so this mechanism will prevent intent sniffing. 18
19 CONCLUSIONS QR codes are by no means a secure standard for data encoding in their current state. There is, however, great room for improvement. New security standards such as Symmetric Encrypted QR codes, Public Key Encrypted QR codes, and Signed QR codes can be implemented within the existing QR standard. SEQRs allow for services such as login by scanning a QR code on a verified mobile device. PKEQRs would allow secure data to be distributed to a select group of people easily. SQRs allow users to check whether they trust the creators of QR codes before opening their potentially dangerous contents. All these methods come at some cost, either in space or time, and therefore should be used only when required, such as when using QR codes to share sensitive data within a company, and not in commercial use. We attempted to gain more insight into whether QR codes or shortened URLs was a more effective attack vector to lure unsuspecting individuals to malicious websites. We conducted a social experiment with two sets posters, one with a TinyURL TM and the other with a QR code, counting the number of individuals that assessed each. However, we found that the numbers observed were too low to make a significant conclusion. Future experiments could improve this by also measuring the number of individuals who viewed the posters but did not choose to navigate to the website, thereby giving the more useful proportion of people who accessed each instead of the raw number of people who accessed each. We searched for implementation vulnerabilities in two QR code readers: Zebra Crossing (ZXing) and a Short Payment Descriptor (SPayD). We discovered three different kinds of vulnerabilities: code injection, unauthorized actions, and information leaking. Code injection allows the users to attack the system and other users by manipulating data through invalid inputs. SPayD is vulnerable to code injection because it does not filter for escape characters. Unauthorized actions occur when the reader misinterprets one form of data as another. This occurs in ZXing due to incorrect implementation of the regex that takes in a string and determines the type of data provided by the QR code. Information leaking also occurs in ZXing, since it uses implicit intents, meaning any application can acquire the data that ZXing broadcasts in the intent. We proposed that ZXing use a mixture of implicit and explicit intents to tackle this issue and prevent information leakage. QR codes have various advantages as an information sharing tool. They allow fast and easy distribution of various forms of structured data and have many applications in manufacturing and business. As long as their users are aware of the vulnerabilities inherent in the standard, in their particular reader, and the ease of social manipulation attacks, QR codes can be used safely. The key is having awareness of the various attacks presented in this paper and implementing preventative measures by use of the standards also presented. If this is done, QR codes can be used globally as a secure and efficient standard for many different purposes. 19
20 REFERENCES [1] QR Code Essentials. DENSO ADC Web. 14 May < =4802>. [2] Kieseberg, Peter, M. Leithner, M. Mulazzani, L. Munroe, S. Schrittwieser, M. Sinha, and E. Weippl. (2010). QR Code Security. Proceedings of the 8th International Conference on Advances in Mobile Computing and Multi-media, MoMM '10. New York, NY, USA. ACM, pp [3] History of QR Code. DENSO WAVE Inc. Web. 14 May < [4] Dante D Orazlo. Google experiments with new QR-based secure login. The Verge. 17 Jan Web. 14 May < ogin-sesame>. [5] William Jackson. With QR codes, even security pros play the fool. GCN. 12 Sept Web. 14 May < [6] Official ZXing ( Zebra Crossing ) Project Home. Github repository. 14 May < [7] SmartPaymentDescriptor Generator. Github repository. 14 May < 20
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Phishing by data URI
Phishing by data URI Henning Klevjer [email protected] October 22, 2012 1 Abstract Historically, phishing web pages have been hosted by web servers that are either compromised or owned by the attacker.
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
Dashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Michael Seltzer COMP 116: Security Final Paper. Client Side Encryption in the Web Browser Mentor: Ming Chow
Michael Seltzer COMP 116: Security Final Paper Client Side Encryption in the Web Browser Mentor: Ming Chow 1 Abstract Web service providers generally look to encryption as a means of ensuring data privacy
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
Degree Certificate Authentication using QR Code and Smartphone
Degree Certificate Authentication using and Smartphone Ankit Singhal M.Tech Computer Science Faculty of Science, Dayalbagh Educational Institute, Dayalbagh, Agra, U.P, India R.S Pavithr Assistant Professor
Security in Android apps
Security in Android apps Falco Peijnenburg (3749002) August 16, 2013 Abstract Apps can be released on the Google Play store through the Google Developer Console. The Google Play store only allows apps
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
Web Application Security Considerations
Web Application Security Considerations Eric Peele, Kevin Gainey International Field Directors & Technology Conference 2006 May 21 24, 2006 RTI International is a trade name of Research Triangle Institute
Application Security Testing. Generic Test Strategy
Application Security Testing Generic Test Strategy Page 2 of 8 Contents 1 Introduction 3 1.1 Purpose: 3 1.2 Application Security Testing: 3 2 Audience 3 3 Test Strategy guidelines 3 3.1 Authentication
Own your LAN with Arp Poison Routing
Own your LAN with Arp Poison Routing By: Rorik Koster April 17, 2006 Security is a popular buzzword heard every day throughout our American culture and possibly even more so in our global economy. From
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Design and Analysis of Methods for Signing Electronic Documents Using Mobile Phones
Design and Analysis of Methods for Signing Electronic Documents Using Mobile Phones Pramote Kuacharoen School of Applied Statistics National Institute of Development Administration 118 Serithai Rd. Bangkapi,
Chapter 10. Cloud Security Mechanisms
Chapter 10. Cloud Security Mechanisms 10.1 Encryption 10.2 Hashing 10.3 Digital Signature 10.4 Public Key Infrastructure (PKI) 10.5 Identity and Access Management (IAM) 10.6 Single Sign-On (SSO) 10.7 Cloud-Based
Intrusion detection for web applications
Intrusion detection for web applications Intrusion detection for web applications Łukasz Pilorz Application Security Team, Allegro.pl Reasons for using IDS solutions known weaknesses and vulnerabilities
Two Factor Zero Knowledge Proof Authentication System
Two Factor Zero Knowledge Proof Authentication System Quan Nguyen Mikhail Rudoy Arjun Srinivasan 6.857 Spring 2014 Project Abstract It is often necessary to log onto a website or other system from an untrusted
90% of data breaches are caused by software vulnerabilities.
90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with
Secure Data Transmission Technique for iphone using Quick Response (QR) Code
Available online at www.globalilluminators.org GlobalIlluminators Full Paper Proceeding MI-BEST-2015, Vol. 1, 53-62 FULL PAPER PROCEEDING Multidisciplinary Studies ISBN: 978-969-9948-10-7 MI-BEST 2015
QR Codes and Other Symbols Seen in Mobile Commerce
QR Codes and Other Symbols Seen in Mobile Commerce This section describes bar code symbols frequently encountered in mobile commerce campaigns. and typical applications for each are listed. One symbology,
Three attacks in SSL protocol and their solutions
Three attacks in SSL protocol and their solutions Hong lei Zhang Department of Computer Science The University of Auckland [email protected] Abstract Secure Socket Layer (SSL) and Transport Layer
Storing Encrypted Plain Text Files Using Google Android
Storing Encrypted Plain Text Files Using Google Android Abstract Jared Hatfield University of Louisville Google Android is an open source operating system that is available on a wide variety of smart phones
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Understanding and Integrating KODAK Picture Authentication Cameras
Understanding and Integrating KODAK Picture Authentication Cameras Introduction Anyone familiar with imaging software such as ADOBE PHOTOSHOP can appreciate how easy it is manipulate digital still images.
Web Application Attacks and Countermeasures: Case Studies from Financial Systems
Web Application Attacks and Countermeasures: Case Studies from Financial Systems Dr. Michael Liu, CISSP, Senior Application Security Consultant, HSBC Inc Overview Information Security Briefing Web Applications
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 02 Overview on Modern Cryptography
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY
INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY Asst.Prof. S.N.Wandre Computer Engg. Dept. SIT,Lonavala University of Pune, [email protected] Gitanjali Dabhade Monika Ghodake Gayatri
Application security testing: Protecting your application and data
E-Book Application security testing: Protecting your application and data Application security testing is critical in ensuring your data and application is safe from security attack. This ebook offers
Bug Report. Date: March 19, 2011 Reporter: Chris Jarabek ([email protected])
Bug Report Date: March 19, 2011 Reporter: Chris Jarabek ([email protected]) Software: Kimai Version: 0.9.1.1205 Website: http://www.kimai.org Description: Kimai is a web based time-tracking application.
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler [email protected] Mentor: Professor Chris Gregg Abstract Modern day authentication systems
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL Ensuring Compliance for PCI DSS 6.5 and 6.6 CONTENTS 04 04 06 08 11 12 13 Overview Payment Card Industry Data Security Standard PCI Compliance for Web Applications
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Project 2: Web Security Pitfalls
EECS 388 September 19, 2014 Intro to Computer Security Project 2: Web Security Pitfalls Project 2: Web Security Pitfalls This project is due on Thursday, October 9 at 6 p.m. and counts for 8% of your course
OPENID AUTHENTICATION SECURITY
OPENID AUTHENTICATION SECURITY Erik Lagercrantz and Patrik Sternudd Uppsala, May 17 2009 1 ABSTRACT This documents gives an introduction to OpenID, which is a system for centralised online authentication.
Last update: February 23, 2004
Last update: February 23, 2004 Web Security Glossary The Web Security Glossary is an alphabetical index of terms and terminology relating to web application security. The purpose of the Glossary is to
OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair dave.wichers@owasp.
and Top 10 (2007 Update) Dave Wichers The Foundation Conferences Chair [email protected] COO, Aspect Security [email protected] Copyright 2007 - The Foundation This work is available
Manipulating Microsoft SQL Server Using SQL Injection
Manipulating Microsoft SQL Server Using SQL Injection Author: Cesar Cerrudo ([email protected]) APPLICATION SECURITY, INC. WEB: E-MAIL: [email protected] TEL: 1-866-9APPSEC 1-212-947-8787 INTRODUCTION
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)
SQL Injection January 23, 2013
Web-based Attack: SQL Injection SQL Injection January 23, 2013 Authored By: Stephanie Reetz, SOC Analyst Contents Introduction Introduction...1 Web applications are everywhere on the Internet. Almost Overview...2
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
E-Book Security Assessment: NuvoMedia Rocket ebook TM
E-Book Security Assessment: NuvoMedia Rocket ebook TM July 1999 Prepared For: The Association of American Publishers Prepared By: Global Integrity Corporation 4180 La Jolla Village Drive, Suite 450 La
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker www.quotium.com 1/14 Summary Abstract 3 PCI DSS Statistics 4 PCI DSS Application Security 5 How Seeker Helps You Achieve PCI DSS
Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper
Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks Whitepaper The security industry has extensively focused on protecting against malicious injection attacks like
SQuAD: Application Security Testing
SQuAD: Application Security Testing Terry Morreale Ben Whaley June 8, 2010 Why talk about security? There has been exponential growth of networked digital systems in the past 15 years The great things
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks
White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have
AS DNB banka. DNB Link specification (B2B functional description)
AS DNB banka DNB Link specification (B2B functional description) DNB_Link_FS_EN_1_EXTSYS_1_L_2013 Table of contents 1. PURPOSE OF THE SYSTEM... 4 2. BUSINESS PROCESSES... 4 2.1. Payment for goods and services...
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Banking Security using Honeypot
Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai [email protected] Abstract New threats are constantly emerging to the security of organization s information
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Web Application Guidelines
Web Application Guidelines Web applications have become one of the most important topics in the security field. This is for several reasons: It can be simple for anyone to create working code without security
Is your data safe out there? -A white Paper on Online Security
Is your data safe out there? -A white Paper on Online Security Introduction: People should be concerned of sending critical data over the internet, because the internet is a whole new world that connects
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
CSE331: Introduction to Networks and Security. Lecture 17 Fall 2006
CSE331: Introduction to Networks and Security Lecture 17 Fall 2006 Announcements Project 2 is due next Weds. Homework 2 has been assigned: It's due on Monday, November 6th. CSE331 Fall 2004 2 Summary:
RFG Secure FTP. Web Interface
RFG Secure FTP Web Interface Step 1: Getting to the Secure FTP Web Interface: Open your preferred web browser and type the following address: http://ftp.raddon.com After you hit enter, you will be taken
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke
EVALUATING COMMERCIAL WEB APPLICATION SECURITY By Aaron Parke Outline Project background What and why? Targeted sites Testing process Burp s findings Technical talk My findings and thoughts Questions Project
SQL Injection Protection by Variable Normalization of SQL Statement
Page 1 of 9 SQL Injection Protection by Variable Normalization of SQL Statement by: Sam M.S. NG, 0 http://www.securitydocs.com/library/3388 "Make everything as simple as possible, but not simpler." --
Web Application Penetration Testing
Web Application Penetration Testing 2010 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Will Bechtel [email protected]
Online signature API. Terms used in this document. The API in brief. Version 0.20, 2015-04-08
Online signature API Version 0.20, 2015-04-08 Terms used in this document Onnistuu.fi, the website https://www.onnistuu.fi/ Client, online page or other system using the API provided by Onnistuu.fi. End
White Paper: Multi-Factor Authentication Platform
White Paper: Multi-Factor Authentication Platform Version: 1.4 Updated: 29/10/13 Contents: About zero knowledge proof authentication protocols: 3 About Pairing-Based Cryptography (PBC) 4 Putting it all
The Benefits of SSL Content Inspection ABSTRACT
The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic
OWASP Top Ten Tools and Tactics
OWASP Top Ten Tools and Tactics Russ McRee Copyright 2012 HolisticInfoSec.org SANSFIRE 2012 10 JULY Welcome Manager, Security Analytics for Microsoft Online Services Security & Compliance Writer (toolsmith),
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
Streamlining Web and Email Security
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor
Salesforce1 Mobile Security Guide
Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
Web Application Security Assessment and Vulnerability Mitigation Tests
White paper BMC Remedy Action Request System 7.6.04 Web Application Security Assessment and Vulnerability Mitigation Tests January 2011 www.bmc.com Contacting BMC Software You can access the BMC Software
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
WHY YOU NEED AN SSL CERTIFICATE
Go Daddy Technical Brief ecommerce Security WHY YOU NEED AN SSL CERTIFICATE In the world of electronic commerce, security is paramount. Although Web sales are on the rise, widespread fears about sending
What Are Certificates?
The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Web Application Security
E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary
SQL Injection Attacks: Detection in a Web Application Environment
SQL Injection Attacks: Detection in a Web Application Environment Table of Contents 1 Foreword... 1 2 Background... 3 2.1 Web Application Environment... 3 2.2 SQL Attack Overview... 3 2.3 Applications
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
- Table of Contents -
- Table of Contents - 1 INTRODUCTION... 1 1.1 TARGET READERS OF THIS DOCUMENT... 1 1.2 ORGANIZATION OF THIS DOCUMENT... 2 1.3 COMMON CRITERIA STANDARDS DOCUMENTS... 3 1.4 TERMS AND DEFINITIONS... 4 2 OVERVIEW
Application Design and Development
C H A P T E R9 Application Design and Development Practice Exercises 9.1 What is the main reason why servlets give better performance than programs that use the common gateway interface (CGI), even though
Cleaning Encrypted Traffic
Optenet Documentation Cleaning Encrypted Traffic Troubleshooting Guide iii Version History Doc Version Product Date Summary of Changes V6 OST-6.4.300 01/02/2015 English editing Optenet Documentation
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY Varun Gandhi 1 Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas,
MIGRATIONWIZ SECURITY OVERVIEW
MIGRATIONWIZ SECURITY OVERVIEW Table of Contents Introduction... 2 Shared Security Approach... 2 Customer Best Practices... 2 Application Security... 4 Database Level Security... 4 Network Security...
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
Testing the OWASP Top 10 Security Issues
Testing the OWASP Top 10 Security Issues Andy Tinkham & Zach Bergman, Magenic Technologies Contact Us 1600 Utica Avenue South, Suite 800 St. Louis Park, MN 55416 1 (877)-277-1044 [email protected] Who Are
EXECUTIVE BRIEF. IT and Business Professionals Say Website Attacks are Persistent and Varied. In this Paper
Sponsored by IT and Business Professionals Say Website Attacks are Persistent and Varied EXECUTIVE BRIEF In this Paper Thirty percent of IT and business professionals say their organization was attacked
The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA
The Weakest Link: Mitigating Web Application Vulnerabilities webscurity White Paper webscurity Inc. Minneapolis, Minnesota USA January 25, 2007 Contents Executive Summary...3 Introduction...4 Target Audience...4
Web application security
Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0
