Search-based multi-vulnerability testing of XML injections in web applications

被引:12
作者
Jan, Sadeeq [1 ,2 ]
Panichella, Annibale [1 ,3 ]
Arcuri, Andrea [4 ]
Briand, Lionel [1 ]
机构
[1] Univ Luxembourg, SnT, Luxembourg, Luxembourg
[2] Univ Engn & Technol, Dept Comp Sci & IT, Peshawar, Pakistan
[3] Delft Univ Technol, Software Engn Res Grp, Delft, Netherlands
[4] Kristiania Univ Coll, Fac Technol, Oslo, Norway
基金
欧盟地平线“2020”;
关键词
Security testing; Code injection vulnerabilities; Search-based software engineering; TEST DATA GENERATION; ALGORITHM; SOAP;
D O I
10.1007/s10664-019-09707-8
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Modern web applications often interact with internal web services, which are not directly accessible to users. However, malicious user inputs can be used to exploit security vulnerabilities in web services through the application front-ends. Therefore, testing techniques have been proposed to reveal security flaws in the interactions with back-end web services, e.g., XML Injections (XMLi). Given a potentially malicious message between a web application and web services, search-based techniques have been used to find input data to mislead the web application into sending such a message, possibly compromising the target web service. However, state-of-the-art techniques focus on (search for) one single malicious message at a time. Since, in practice, there can be many different kinds of malicious messages, with only a few of them which can possibly be generated by a given front-end, searching for one single message at a time is ineffective and may not scale. To overcome these limitations, we propose a novel co-evolutionary algorithm (COMIX) that is tailored to our problem and uncover multiple vulnerabilities at the same time. Our experiments show that COMIX outperforms a single-target search approach for XMLi and other multi-target search algorithms originally defined for white-box unit testing.
引用
收藏
页码:3696 / 3729
页数:34
相关论文
共 73 条
  • [1] A systematic review of search-based testing for non-functional system properties
    Afzal, Wasif
    Torkar, Richard
    Feldt, Robert
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2009, 51 (06) : 957 - 976
  • [2] PROGRAM DATA FLOW ANALYSIS PROCEDURE
    ALLEN, FE
    COCKE, J
    [J]. COMMUNICATIONS OF THE ACM, 1976, 19 (03) : 137 - 147
  • [3] Search-based software test data generation for string data using program-specific search operators
    Alshraideh, Mohammad
    Bottaci, Leonardo
    [J]. SOFTWARE TESTING VERIFICATION & RELIABILITY, 2006, 16 (03) : 175 - 203
  • [4] [Anonymous], 2016, TESTING XML INJECTIO
  • [5] [Anonymous], 2000, ARCHITECTURAL STYLES
  • [6] [Anonymous], 2016, The Magical Code Injection Rainbow!
  • [7] [Anonymous], 2016, WSFUZZER TOOL
  • [8] [Anonymous], 2007, Secure Programming with Static Analysis
  • [9] [Anonymous], 2005, USENIX SEC S
  • [10] [Anonymous], 2015, BUILDING MICROSERVIC