首页> 外文期刊>Journal of computer security >Automated detection of parameter tampering opportunities and vulnerabilities in web applications
【24h】

Automated detection of parameter tampering opportunities and vulnerabilities in web applications

机译:自动检测Web应用程序中的参数篡改机会和漏洞

获取原文
           

摘要

Parameter tampering attacks are dangerous to a web application whose server fails to replicate the validation of user-supplied data that is performed by the client in web forms. Malicious users who circumvent the client can capitalize on the missing server validation. In this paper, we provide a formal description of parameter tampering vulnerabilities and a high level approach for their detection. We specialize this high level approach to develop complementary detection solutions in two interesting settings: blackbox (only analyze client-side code in web forms) and whitebox (also analyze server-side code that processes submitted web forms). This paper presents interesting challenges encountered in realizing the high level approach for each setting and novel technical contributions that address these challenges. We also contrast utility, difficulties and effectiveness issues in both settings and provide a quantitative comparison of results. Our experiments with real world and open source applications demonstrate that parameter tampering vulnerabilities are prolific (total 47 in 9 applications), and their exploitation can have serious consequences including unauthorized transactions, account hijacking and financial losses. We conclude this paper with a discussion on countermeasures for parameter tampering attacks and present a detailed survey of existing defenses and their suitability.
机译:参数篡改攻击对Web应用程序很危险,该Web应用程序的服务器无法复制由客户端以Web形式执行的用户提供的数据的验证。绕过客户端的恶意用户可以利用缺少的服务器验证。在本文中,我们提供了参数篡改漏洞的正式描述以及对其进行检测的高级方法。我们专门采用这种高级方法,在两个有趣的设置中开发互补的检测解决方案:黑盒(仅分析Web表单中的客户端代码)和白盒(还分析处理提交的Web表单的服务器端代码)。本文提出了在实现每种环境的高级方法时遇到的有趣挑战,并提出了应对这些挑战的新颖技术。我们还对比了两种情况下的效用,困难和有效性问题,并对结果进行了定量比较。我们在现实世界和开放源代码应用程序中进行的实验表明,参数篡改漏洞数量众多(9个应用程序中共有47个),利用这些漏洞可能会造成严重后果,包括未授权交易,帐户劫持和财务损失。在本文的结尾,我们讨论了针对参数篡改攻击的对策,并对现有防御及其适用性进行了详细调查。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号