An Integrated Approach for Effective Injection Vulnerability Analysis of Web Applications Through Security Slicing and Hybrid Constraint Solving

被引:14
|
作者
Thome, Julian [1 ]
Shar, Lwin Khin [2 ,3 ]
Bianculli, Domenico [1 ]
Briand, Lionel [1 ]
机构
[1] Univ Luxembourg, Interdisciplinary Ctr Secur Reliabil & Trust SnT, 29 Ave JF Kennedy, L-1855 Luxembourg, Luxembourg
[2] Univ Luxembourg, Interdisciplinary Ctr Secur Reliabil & Trust SnT, L-4365 Esch Sur Alzette, Luxembourg
[3] Nanyang Technol Univ, Sch Comp Sci & Engn, Singapore 639798, Singapore
关键词
Security; Benchmark testing; Tools; Explosions; !text type='Java']Java[!/text; Static analysis; Reliability; Vulnerability detection; constraint solving; static analysis; search-based software engineering; STATIC ANALYSIS;
D O I
10.1109/TSE.2018.2844343
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Malicious users can attack Web applications by exploiting injection vulnerabilities in the source code. This work addresses the challenge of detecting injection vulnerabilities in the server-side code of Java Web applications in a scalable and effective way. We propose an integrated approach that seamlessly combines security slicing with hybrid constraint solving; the latter orchestrates automata-based solving with meta-heuristic search. We use static analysis to extract minimal program slices relevant to security from Web programs and to generate attack conditions. We then apply hybrid constraint solving to determine the satisfiability of attack conditions and thus detect vulnerabilities. The experimental results, using a benchmark comprising a set of diverse and representative Web applications/services as well as security benchmark applications, show that our approach (implemented in the JOACO tool) is significantly more effective at detecting injection vulnerabilities than state-of-the-art approaches, achieving 98 percent recall, without producing any false alarm. We also compared the constraint solving module of our approach with state-of-the-art constraint solvers, using six different benchmark suites; our approach correctly solved the highest number of constraints (665 out of 672), without producing any incorrect result, and was the one with the least number of time-out/failing cases. In both scenarios, the execution time was practically acceptable, given the offline nature of vulnerability detection.
引用
收藏
页码:163 / 195
页数:33
相关论文
共 27 条
  • [1] Towards Concurrency Race Debugging: An Integrated Approach for Constraint Solving and Dynamic Slicing
    Zheng, Long
    Liao, Xiaofei
    Jin, Hai
    He, Bingsheng
    Xue, Jingling
    Liu, Haikun
    27TH INTERNATIONAL CONFERENCE ON PARALLEL ARCHITECTURES AND COMPILATION TECHNIQUES (PACT 2018), 2018,
  • [2] Unified Approach to Vulnerability Analysis of Web Applications
    Le, H. T.
    Loh, P. K. K.
    INTERNATIONAL ELECTRONIC CONFERENCE ON COMPUTER SCIENCE, 2008, 1060 : 155 - 159
  • [3] Vulnerability Model-based Web Applications Security Testing Approach
    He Cheng
    Liu Yanfei
    ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING III, 2014, 678 : 468 - 472
  • [4] A hybrid approach to geometric constraint solving with graph analysis and reduction
    Lee, KY
    Kwon, OH
    Lee, JY
    Kim, TW
    ADVANCES IN ENGINEERING SOFTWARE, 2003, 34 (02) : 103 - 113
  • [5] Backporting Security Patches of Web Applications: A Prototype Design and Implementation on Injection Vulnerability Patches
    Shi, Youkun
    Zhang, Yuan
    Luo, Tianhan
    Mao, Xiangyu
    Cao, Yinzhi
    Wang, Ziwen
    Zhao, Yudi
    Huang, Zongan
    Yang, Min
    PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 1993 - 2010
  • [6] Analysis of web application security mechanism and attack detection using vulnerability injection technique
    Bhor, R. V.
    Khanuja, H. K.
    2016 INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2016,
  • [7] Measuring the Sustainable-Security of Web Applications Through a Fuzzy-Based Integrated Approach of AHP and TOPSIS
    Agrawal, Alka
    Alenezi, Mamdouh
    Kumar, Rajeev
    Khan, Raees Ahmad
    IEEE ACCESS, 2019, 7 : 153936 - 153951
  • [8] Evaluating the Security Impact of Healthcare Web Applications Through Fuzzy Based Hybrid Approach of Multi-Criteria Decision-Making Analysis
    Agrawal, Alka
    Pandey, Abhishek Kumar
    Baz, Abdullah
    Alhakami, Hosam
    Alhakami, Wajdi
    Kumar, Rajeev
    Khan, Raees Ahmad
    IEEE ACCESS, 2020, 8 : 135770 - 135783
  • [9] Fuzzy-Based Hybrid Approach for Security Impact Evaluation in Healthcare Web Applications
    Chaudhary, Jitendra Kumar
    Arthi, A.
    Shalini, S.
    Gunasundari, C.
    Sharma, Abhishek
    Sahu, Dillip Narayan
    2024 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND APPLIED INFORMATICS, ACCAI 2024, 2024,
  • [10] Security Testing of Web Applications: A Search-Based Approach for Detecting SQL Injection Vulnerabilities
    Liu, Muyang
    Li, Ke
    Chen, Tao
    PROCEEDINGS OF THE 2019 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE COMPANION (GECCCO'19 COMPANION), 2019, : 417 - 418