Skip to content

Common Software Vulnerabilities and Countermeasures

  • screening code for disallowed functions is best performed by static testing

CWE (Common Weakness Enumerations)/SANS Top 25 Vuln Categories

  • hasn't been updated since 2011 but still relevant

OWASP Vuln Categories

  • dedicated to web applications

Common Vulns and Countermeasures

Injection Attacks

  • SQL Injection
    • safest method is stored procedure
  • OS Command Injection
  • Integer overflow/wraparound
  • path traversal
  • XSS
  • CSRF
  • LDAP
  • XML

Cryptography

  • pay attention to algorithms and key length

Input Validation

  • buffer overflow
    • estimated that nearly half of historical exploits stem from buffer overflow

Embedded Systems

  • generally targeted for information disclosure or DoS

Side Channel Attack

  • comes from cryptographic world - attack against implementation, not algorithm
  • use byproduct of a system

Types:

  • timing attacks and power attacks
    • analyze power/time used to make determination about what is happening
  • data remanence attacks
    • cooling RAM to access data after power turned off
  • electromagnetic attacks/acoustic attacks
    • reproduce what is on the screen or was typed on a keyboard