BLOCK: A Black-box Approach for Detection of State Violation Attacks Towards Web Applications

被引:0
|
作者
Li, Xiaowei [1 ]
Xue, Yuan [1 ]
机构
[1] Vanderbilt Univ, Dept Elect Engn & Comp Sci, 221 Kirkland Hall, Nashville, TN 37235 USA
关键词
black-box approach; state violation attack; web application security; invariant;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
State violation attacks towards web applications exploit logic flaws and allow restrictive functions and sensitive information to be accessed at inappropriate states. Since application logic flaws are specific to the intended functionality of a particular web application, it is difficult to develop a general approach that addresses state violation attacks. To date, existing approaches all require web application source code for analysis or instrumentation in order to detect state violations. In this paper, we present BLOCK, a BLack-bOx approach for detecting state violation attaCKs. We regard the web application as a stateless system and infer the intended web application behavior model by observing the interactions between the clients and the web application. We extract a set of invariants from the web request/response sequences and their associated session variable values during its attack-free execution. The set of invariants is then used for evaluating web requests and responses at runtime. Any web request or response that violates the associated invariants is identified as a potential state violation attack. We develop a system prototype based on the WebScarab proxy and evaluate our detection system using a set of real-world web applications. The experiment results demonstrate that our approach is effective at detecting state violation attacks and incurs acceptable performance overhead. Our approach is valuable in that it is independent of the web application source code and can easily scale up.
引用
收藏
页码:247 / 256
页数:10
相关论文
共 50 条
  • [1] Toward Black-Box Detection of Logic Flaws in Web Applications
    Pellegrino, Giancarlo
    Balzarotti, Davide
    21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
  • [2] DetLogic: A black-box approach for detecting logic vulnerabilities in web applications
    Deepa, G.
    Thilagam, P. Santhi
    Praseed, Amit
    Pais, Alwyn R.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 109 : 89 - 109
  • [3] Effective and scalable black-box fuzzing approach for modern web applications
    Alsaedi, Aseel
    Alhuzali, Abeer
    Bamasag, Omaimah
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (10) : 10068 - 10078
  • [4] Automated Black-Box Detection of Side-Channel Vulnerabilities in Web Applications
    Chapman, Peter
    Evans, David
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 263 - 274
  • [5] Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications
    G. Deepa
    P. Santhi Thilagam
    Furqan Ahmed Khan
    Amit Praseed
    Alwyn R. Pais
    Nushafreen Palsetia
    International Journal of Information Security, 2018, 17 : 105 - 120
  • [6] Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications
    Deepa, G.
    Thilagam, P. Santhi
    Khan, Furqan Ahmed
    Praseed, Amit
    Pais, Alwyn R.
    Palsetia, Nushafreen
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (01) : 105 - 120
  • [7] Systematic Black-Box Analysis of Collaborative Web Applications
    Billes, Marina
    Moller, Anders
    Pradel, Michael
    ACM SIGPLAN NOTICES, 2017, 52 (06) : 171 - 184
  • [8] Verification of GUI Applications: A Black-Box Approach
    Arlt, Stephan
    Ermis, Evren
    Feo-Arenis, Sergio
    Podelski, Andreas
    LEVERAGING APPLICATIONS OF FORMAL METHODS, VERIFICATION AND VALIDATION: TECHNOLOGIES FOR MASTERING CHANGE, PT I, 2014, 8802 : 236 - 252
  • [9] Black-box Detection of Backdoor Attacks with Limited Information and Data
    Dong, Yinpeng
    Yang, Xiao
    Deng, Zhijie
    Pang, Tianyu
    Xiao, Zihao
    Su, Hang
    Zhu, Jun
    2021 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2021), 2021, : 16462 - 16471
  • [10] Black-box Attacks to Log-based Anomaly Detection
    Huang, Shaohan
    Liu, Yi
    Fung, Carol
    Yang, Hailong
    Luan, Zhongzhi
    2022 18TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM 2022): INTELLIGENT MANAGEMENT OF DISRUPTIVE NETWORK TECHNOLOGIES AND SERVICES, 2022, : 310 - 316