{"id":3197,"date":"2023-11-07T08:42:46","date_gmt":"2023-11-07T08:42:46","guid":{"rendered":"http:\/\/icmc2024.kalasalingam.ac.in\/?page_id=3197"},"modified":"2023-11-07T10:08:07","modified_gmt":"2023-11-07T10:08:07","slug":"bertino-elisa","status":"publish","type":"page","link":"http:\/\/icmc2024.kalasalingam.ac.in\/index.php\/bertino-elisa\/","title":{"rendered":"Bertino, Elisa"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"3197\" class=\"elementor elementor-3197\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9e90270 e-con-boxed e-con\" data-id=\"9e90270\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-afc1fbe e-con-full e-con\" data-id=\"afc1fbe\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b0c93b0 elementor-widget elementor-widget-image\" data-id=\"b0c93b0\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.9.2 - 21-12-2022 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"471\" height=\"653\" src=\"http:\/\/icmc2024.kalasalingam.ac.in\/wp-content\/uploads\/2023\/04\/1-Elisa-Bertino.jpg\" class=\"attachment-large size-large wp-image-2491\" alt=\"\" srcset=\"http:\/\/icmc2024.kalasalingam.ac.in\/wp-content\/uploads\/2023\/04\/1-Elisa-Bertino.jpg 471w, http:\/\/icmc2024.kalasalingam.ac.in\/wp-content\/uploads\/2023\/04\/1-Elisa-Bertino-216x300.jpg 216w\" sizes=\"auto, (max-width: 471px) 100vw, 471px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-486ca4a e-con-full e-con\" data-id=\"486ca4a\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a56998b elementor-widget elementor-widget-heading\" data-id=\"a56998b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.9.2 - 21-12-2022 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">Elisa Bertino<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b10046b elementor-widget elementor-widget-heading\" data-id=\"b10046b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Purdue University, USA<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ee202bc e-con-boxed e-con\" data-id=\"ee202bc\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-cae8ff2 e-con-boxed e-con\" data-id=\"cae8ff2\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e290f93 elementor-widget elementor-widget-heading\" data-id=\"e290f93\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">The Persistent Problem of Applications Insecurity<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b314ac elementor-widget elementor-widget-heading\" data-id=\"4b314ac\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Data is a critical resource and as such it is very often the target of cyber-attacks\nwith a variety of goals, including data theft and ransom requests.\u00a0 Today database systems\nprovide several effective security controls and defenses, such as database encryption, fine-\ngrained content and context-based access control, role-based access control, and logging\ncapabilities for security relevant events. In addition, database systems support a variety of\nauthentication techniques, such as multi-factor authentication. However, there is a major\nweak point in data security: the applications. Once data is transmitted from a database to\napplications, the data is exposed to many risks if applications have vulnerabilities.\nUnfortunately, applications and more in general software systems are still often insecure,\ndespite the fact the \u201cproblem of software security\u201d had been known to the industry and\nresearch communities for decades.\u00a0 In the case of database applications,\u00a0 for example, SQL\ninjection vulnerabilities - known since more than 20 years, are still common; for example,\njust in 2022, 1162 vulnerabilities with the type \u201cSQL injections\u201d were accepted as a common\nCVE (common vulnerability exposure). In this talk, I first briefly argue why the software\nsecurity problem is more complex than ever. I then focus on the problem of SQL injection\nand other vulnerabilities, often occurring in database applications, and present an initial\napproach to automatically detect these vulnerabilities and &quot;repair&quot; them. I also cover the\ncase of a more sophisticated attacker, able to tamper with the application code.\u00a0 I then\nmove on to discuss the problem of software supply-chain attacks and research directions.<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Elisa Bertino Purdue University, USA The Persistent Problem of Applications Insecurity Data is a critical resource and as such it is very often the target of cyber-attacks with a variety of goals, including data theft and ransom requests.\u00a0 Today database systems provide several effective security controls and defenses, such as database encryption, fine- grained content &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"http:\/\/icmc2024.kalasalingam.ac.in\/index.php\/bertino-elisa\/\"> <span class=\"screen-reader-text\">Bertino, Elisa<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":""},"class_list":["post-3197","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"http:\/\/icmc2024.kalasalingam.ac.in\/index.php\/wp-json\/wp\/v2\/pages\/3197","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/icmc2024.kalasalingam.ac.in\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/icmc2024.kalasalingam.ac.in\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/icmc2024.kalasalingam.ac.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/icmc2024.kalasalingam.ac.in\/index.php\/wp-json\/wp\/v2\/comments?post=3197"}],"version-history":[{"count":5,"href":"http:\/\/icmc2024.kalasalingam.ac.in\/index.php\/wp-json\/wp\/v2\/pages\/3197\/revisions"}],"predecessor-version":[{"id":3492,"href":"http:\/\/icmc2024.kalasalingam.ac.in\/index.php\/wp-json\/wp\/v2\/pages\/3197\/revisions\/3492"}],"wp:attachment":[{"href":"http:\/\/icmc2024.kalasalingam.ac.in\/index.php\/wp-json\/wp\/v2\/media?parent=3197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}