Reference : An Integrated Approach for Effective Injection Vulnerability Analysis of Web Applicat...
Reports : Internal report
Engineering, computing & technology : Computer science
Security, Reliability and Trust
http://hdl.handle.net/10993/32059
An Integrated Approach for Effective Injection Vulnerability Analysis of Web Applications through Security Slicing and Hybrid Constraint Solving
English
Thome, Julian mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Shar, Lwin Khin mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Bianculli, Domenico mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Briand, Lionel mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Aug-2017
SnT Centre - University of Luxembourg
978-99959-58-00-8
TR-SNT-2017-4
Luxembourg
Luxembourg
[en] Vulnerability detection ; Constraint solving ; Static analysis ; Search-based software engineering
[en] Malicious users can attack Web applications by exploiting injection
vulnerabilities in the source code. This work addresses the challenge
of detecting injection vulnerabilities in a scalable and effective
way. We propose an integrated approach that seamlessly combines
security slicing with hybrid constraint solving, i.e., constraint
solving based on a combination of automata-based solving and
meta-heuristic search. We use static analysis to extract minimal
program slices relevant to security from Web programs and to generate
attack conditions. We then apply hybrid constraint solving to
determine the satisfiability of attack conditions and thus detect
vulnerabilities.

The experimental results, using a benchmark suite comprising nine
diverse and representative Web applications, show that our approach
(implemented in the JOACO tool) is significantly more effective at
detecting injection vulnerabilities than state-of-the-art approaches,
achieving 98% recall, without producing any false alarm. We also
compared the constraint solving module of our approach with
state-of-the-art constraint solvers, using five different benchmark
suites; our approach correctly solved the highest number of
constraints (43177 out of 43184), without producing any incorrect
result, and was the one with the least number of time-out/failing
cases. In both scenarios, the execution time was practically
acceptable, given the offline nature of vulnerability detection.
SnT - Interdisciplinary Centre for Security, Reliability and Trust
Fonds National de la Recherche - FnR
Researchers ; Professionals ; Students
http://hdl.handle.net/10993/32059
FnR ; FNR9132112 > Julian Thomé > HyVAn > A Scalable And Accurate Hybrid Vulnerability Analysis Framework > 01/09/2014 > 14/04/2018 > 2014

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Open access
SNT-TR-2017-4.pdfAuthor postprint704.59 kBView/Open

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.