Reference : Security Slicing for Auditing XML, XPath, and SQL Injection Vulnerabilities
Scientific congresses, symposiums and conference proceedings : Paper published in a book
Engineering, computing & technology : Computer science
http://hdl.handle.net/10993/21795
Security Slicing for Auditing XML, XPath, and SQL Injection Vulnerabilities
English
Thome, Julian mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Shar, Lwin Khin mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Briand, Lionel mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > > ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)]
2015
26th IEEE International Symposium on Software Reliability Engineering
Yes
International
26th IEEE International Symposium on Software Reliability Engineering
from 02-11-2015 to 05-11-2015
[en] Security auditing ; static analysis ; vulnerability
[en] XML, XPath, and SQL injection vulnerabilities are among the most common and serious security issues for Web applications and Web services. Thus, it is important for security auditors to ensure that the implemented code is, to the extent pos- sible, free from these vulnerabilities before deployment. Although existing taint analysis approaches could automatically detect potential vulnerabilities in source code, they tend to generate many false warnings. Furthermore, the produced traces, i.e. data- flow paths from input sources to security-sensitive operations, tend to be incomplete or to contain a great deal of irrelevant infor- mation. Therefore, it is difficult to identify real vulnerabilities and determine their causes. One suitable approach to support security auditing is to compute a program slice for each security-sensitive operation, since it would contain all the information required for performing security audits (Soundness). A limitation, however, is that such slices may also contain information that is irrelevant to security (Precision), thus raising scalability issues for security audits. In this paper, we propose an approach to assist security auditors by defining and experimenting with pruning techniques to reduce original program slices to what we refer to as security slices, which contain sound and precise information. To evaluate the proposed pruning mechanism by using a number of open source benchmarks, we compared our security slices with the slices generated by a state-of-the-art program slicing tool. On average, our security slices are 80% smaller than the original slices, thus suggesting significant reduction in auditing costs.
SnT - Interdisciplinary Centre for Security, Reliability and Trust
National Research Fund, Luxembourg (FNR/P10/03 and FNR9132112)
Researchers ; Professionals ; Students
http://hdl.handle.net/10993/21795

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Open access
ISSRE15.pdfPublisher postprint234.72 kBView/Open

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.