首页> 外文OA文献 >An Integrated Approach for Effective Injection Vulnerability Analysis of Web Applications through Security Slicing and Hybrid Constraint Solving
【2h】

An Integrated Approach for Effective Injection Vulnerability Analysis of Web Applications through Security Slicing and Hybrid Constraint Solving

机译:基于安全切片和混合约束求解的Web应用有效注入漏洞综合方法

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Malicious users can attack Web applications by exploiting injectionvulnerabilities in the source code. This work addresses the challengeof detecting injection vulnerabilities in a scalable and effectiveway. We propose an integrated approach that seamlessly combinessecurity slicing with hybrid constraint solving, i.e., constraintsolving based on a combination of automata-based solving andmeta-heuristic search. We use static analysis to extract minimalprogram slices relevant to security from Web programs and to generateattack conditions. We then apply hybrid constraint solving todetermine the satisfiability of attack conditions and thus detectvulnerabilities.The experimental results, using a benchmark suite comprising ninediverse and representative Web applications, show that our approach(implemented in the JOACO tool) is significantly more effective atdetecting injection vulnerabilities than state-of-the-art approaches,achieving 98% recall, without producing any false alarm. We alsocompared the constraint solving module of our approach withstate-of-the-art constraint solvers, using five different benchmarksuites; our approach correctly solved the highest number ofconstraints (43177 out of 43184), without producing any incorrectresult, and was the one with the least number of time-out/failingcases. In both scenarios, the execution time was practicallyacceptable, given the offline nature of vulnerability detection.
机译:恶意用户可以通过利用源代码中的注入漏洞来攻击Web应用程序。这项工作解决了以可扩展且有效的方式检测注入漏洞的挑战。我们提出了一种集成方法,该方法将安全性切片与混合约束求解(即基于基于自动机的求解和元启发式搜索的组合的约束求解)无缝组合。我们使用静态分析从Web程序中提取与安全性相关的最小程序片段,并生成攻击条件。然后,我们使用混合约束求解来确定攻击条件的可满足性,从而确定漏洞。实验结果使用包含9个多样化和代表性Web应用程序的基准套件,表明我们的方法(在JOACO工具中实施)比检测漏洞更有效。最先进的方法,可实现98%的召回率,而不会产生任何误报。我们还使用五种不同的基准套件将我们的方法的约束求解模块与最新的约束求解器进行了比较;我们的方法正确地解决了最大数量的约束(43184个约束中的43177个),而没有产生任何不正确的结果,并且是超时/失败案例最少的方法。在两种情况下,考虑到漏洞检测的离线性质,执行时间实际上是可以接受的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号