首页> 外文期刊>Journal of network and computer applications >DetLogic: A black-box approach for detecting logic vulnerabilities in web applications
【24h】

DetLogic: A black-box approach for detecting logic vulnerabilities in web applications

机译:DetLogic:一种用于检测Web应用程序中逻辑漏洞的黑盒方法

获取原文
获取原文并翻译 | 示例

摘要

Web applications are subject to attacks by malicious users owing to the fact that the applications are implemented by software developers with insufficient knowledge about secure programming. The implementation flaws arising due to insecure coding practices allow attackers to exploit the application in order to perform adverse actions leading to undesirable consequences. These flaws can be categorized into injection and logic flaws. As large number of tools and solutions are available for addressing injection flaws, the focus of the attackers is shifting towards exploitation of logic flaws. The logic flaws allow attackers to compromise the application-specific functionality against the expectations of the stakeholders, and hence it is important to identify these flaws in order to avoid exploitation. Therefore, a prototype called DetLogic is developed for detecting different types of logic vulnerabilities such as parameter manipulation, access-control, and workflow bypass vulnerabilities in web applications. DetLogic employs black-box approach, and models the intended behavior of the application as an annotated finite state machine, which is subsequently used for deriving constraints related to input parameters, access-control, and workflows. The derived constraints are violated for simulating attack vectors to identify the vulnerabilities. DetLogic is evaluated against benchmark applications and is found to work effectively.
机译:由于Web应用程序是由软件开发人员在对安全编程知识不足的情况下实施的,因此受到恶意用户的攻击。由于不安全的编码做法而导致的实现缺陷使攻击者可以利用该应用程序来执行不良操作,从而导致不良后果。这些缺陷可以分为注入缺陷和逻辑缺陷。由于有大量工具和解决方案可用于解决注入缺陷,因此攻击者的重点正在转向利用逻辑缺陷。逻辑缺陷使攻击者无法按照涉众的期望来折衷特定于应用程序的功能,因此,识别这些缺陷以避免利用很重要。因此,开发了一个名为DetLogic的原型,用于检测Web应用程序中不同类型的逻辑漏洞,例如参数操纵,访问控制和工作流旁路漏洞。 DetLogic采用黑盒方法,并将应用程序的预期行为建模为带注释的有限状态机,随后将其用于导出与输入参数,访问控制和工作流相关的约束。违反了导出的约束条件,无法模拟攻击向量以识别漏洞。 DetLogic根据基准应用程序进行了评估,并且可以有效地工作。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号