首页> 外文会议>2013 20th Working Conference on Reverse Engineering >LigRE: Reverse-engineering of control and data flow models for black-box XSS detection
【24h】

LigRE: Reverse-engineering of control and data flow models for black-box XSS detection

机译:LigRE:用于黑盒XSS检测的控制和数据流模型的逆向工程

获取原文
获取原文并翻译 | 示例

摘要

Fuzz testing consists of automatically generating and sending malicious inputs to an application in order to hopefully trigger a vulnerability. In order to be efficient, the fuzzing should answer questions such as: Where to send a malicious value? Where to observe its effects? How to position the system in such states? Answering such questions is a matter of understanding precisely enough the application. Reverseengineering is a possible way to gain this knowledge, especially in a black-box harness. In fact, given the complexity of modern web applications, automated black-box scanners alternatively reverse-engineer and fuzz web applications to detect vulnerabilities. We present an approach, named as LigRE, which improves the reverse engineering to guide the fuzzing. We adapt a method to automatically learn a control flow model of web applications, and annotate this model with inferred data flows. Afterwards, we generate slices of the model for guiding the scope of a fuzzer. Empirical experiments show that LigRE increases detection capabilities of Cross Site Scripting (XSS), a particular case of web command injection vulnerabilities.
机译:模糊测试包括自动生成恶意输入并将其发送到应用程序,以希望触发漏洞。为了提高效率,模糊测试应该回答以下问题:在哪里发送恶意值?在哪里观察其效果?如何将系统置于这种状态?回答此类问题只是对应用程序有足够的了解。逆向工程是获得此知识的一种可能方式,尤其是在黑匣子中。实际上,鉴于现代Web应用程序的复杂性,自动黑匣子扫描器可以对Web应用程序进行反向工程和模糊处理以检测漏洞。我们提出了一种名为LigRE的方法,该方法改进了逆向工程以指导模糊测试。我们采用一种方法来自动学习Web应用程序的控制流模型,并使用推断的数据流对此模型进行注释。然后,我们生成模型的切片以指导模糊器的范围。经验实验表明,LigRE增加了跨站点脚本(XSS)的检测功能,这是Web命令注入漏洞的一种特殊情况。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号