首页> 外文会议>International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing >Dynamic Taint Tracking of Web Application Based on Static Code Analysis
【24h】

Dynamic Taint Tracking of Web Application Based on Static Code Analysis

机译:基于静态代码分析的Web应用程序动态污点跟踪

获取原文

摘要

With the continuous development of J2EE technology, frequent attacks using security vulnerabilities in web applications have caused enormous economic loss to the users. Dynamic taint tracking is an important part to analyze the program dynamically. In this paper, we put forward a new dynamic solution in the Java virtual machine, warning external attacks and recording specific taint propagation path. This scheme combines static analysis techniques to collect reachable "source-derivation-sink" taint flow and reduce the runtime overhead. With the help of AOP (aspect-oriented programming) technology, we could only insert monitor codes to interested taint paths to improve the efficiency of instrumentation. Finally, we implemented this dynamic taint tracking approach to explore SQL injection and XSS vulnerabilities in web applications based on the Java Servlet Specification and proved practicality.
机译:随着J2EE技术​​的不断发展,使用Web应用程序中的安全漏洞进行的频繁攻击已给用户带来了巨大的经济损失。动态污点跟踪是动态分析程序的重要部分。在本文中,我们提出了一种在Java虚拟机中的新动态解决方案,可以警告外部攻击并记录特定的异味传播路径。该方案结合了静态分析技术,以收集可访问的“源-派生-接收器”污点流并减少运行时开销。借助于AOP(面向方面​​的编程)技术,我们只能将监视代码插入感兴趣的异味路径中,以提高仪器的效率。最后,我们基于Java Servlet规范实施了这种动态污点跟踪方法,以探索Web应用程序中的SQL注入和XSS漏洞,并证明了实用性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号