首页> 外文会议>Software Security and Reliability (SERE), 2012 IEEE Sixth International Conference on >Semi-Automatic Security Testing of Web Applications from a Secure Model
【24h】

Semi-Automatic Security Testing of Web Applications from a Secure Model

机译:从安全模型对Web应用程序进行半自动安全性测试

获取原文
获取原文并翻译 | 示例

摘要

Web applications are a major target of attackers. The increasing complexity of such applications and the subtlety of today's attacks make it very hard for developers to manually secure their web applications. Penetration testing is considered an art, the success of a penetration tester in detecting vulnerabilities mainly depends on his skills. Recently, model-checkers dedicated to security analysis have proved their ability to identify complex attacks on web-based security protocols. However, bridging the gap between an abstract attack trace output by a model-checker and a penetration test on the real web application is still an open issue. We present here a methodology for testing web applications starting from a secure model. First, we mutate the model to introduce specific vulnerabilities present in web applications. Then, a model-checker outputs attack traces that exploit those vulnerabilities. Next, the attack traces are translated into concrete test cases by using a 2-step mapping. Finally, the tests are executed on the real system using an automatic procedure that may request the help of a test expert from time to time. A prototype has been implemented and evaluated on Web Goat, an insecure web application maintained by OWASP. It successfully reproduced Role-Based Access Control (RBAC) and Cross-Site Scripting (XSS) attacks.
机译:Web应用程序是攻击者的主要目标。此类应用程序的复杂性不断提高,以及当今攻击的微妙之处,使开发人员很难手动保护其Web应用程序。渗透测试被认为是一门艺术,渗透测试人员能否成功检测漏洞主要取决于其技能。最近,致力于安全性分析的模型检查器已证明其具有识别基于Web的安全协议的复杂攻击的能力。但是,弥合模型检查器输出的抽象攻击跟踪与真实Web应用程序上的渗透测试之间的差距仍然是一个悬而未决的问题。我们在这里介绍一种从安全模型开始测试Web应用程序的方法。首先,我们更改模型以引入Web应用程序中存在的特定漏洞。然后,模型检查器输出利用这些漏洞的攻击跟踪。接下来,使用两步映射将攻击痕迹转换为具体的测试用例。最后,使用自动过程在真实系统上执行测试,该过程可能会不时请求测试专家的帮助。已在OWASP维护的不安全的Web应用程序Web Goat上实现并评估了原型。它成功地复制了基于角色的访问控制(RBAC)和跨站点脚本(XSS)攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号