CRAXweb: Automatic Web Application Testing and Attack Generation

被引:9
作者
Huang, Shih-Kun [1 ]
Lu, Han-Lin [1 ]
Leong, Wai-Meng [1 ]
Liu, Huan [1 ]
机构
[1] Natl Chiao Tung Univ, Informat Technol Serv Ctr, Hsinchu, Taiwan
来源
2013 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY (SERE) | 2013年
关键词
Web security; Symbolic execution; Automatic exploit generation;
D O I
10.1109/SERE.2013.26
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper proposes to test web applications and generate the feasible exploits automatically, including cross-site scripting and SQL injection attacks. We test the web applications with initial random inputs by detecting symbolic queries to SQL servers or symbolic responses to HTTP servers. After symbolic outputs detected, we are able to generate attack strings and reproduce the results, emulating the manual attack behavior. In contrast with other traditional detection and prevention methods, we can determine the presence of vulnerabilities and prove the feasibility of attacks. This automatic generation process is based on a dynamic software testing method-symbolic execution by (SE)-E-2. We have applied this automatic process to several known vulnerabilities on large-scale open source web applications, and generated the attack strings successfully. Our method is web platform independent, covering PHP, JSP, Rails, and Django due to the supports of the whole system environment of (SE)-E-2.
引用
收藏
页码:208 / 217
页数:10
相关论文
共 20 条
[1]  
Acunetix, AC WEB CRAWL
[2]  
[Anonymous], 2009, P 5 WORKSH HOTDEP
[3]  
Artzi Shay., 2008, P 2008 INT S SOFTWAR, P261, DOI DOI 10.1145/1390630.1390662
[4]  
Barrett C., 2005, COMPUTER AIDED VERIF, P503
[5]  
BELLARD F, 2005, QEMU FAST PORTABLE D
[6]  
Bisht P, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P575
[7]  
Cadar C., 2008, Proceedings of the 8th USENIX conference on Operating systems design and implementation, OSDI'08, (USA), P209
[8]   Symbolic Security Analysis of Ruby-on-Rails Web Applications [J].
Chaudhuri, Avik ;
Foster, Jeffrey S. .
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, :585-594
[9]  
DeMott J. D., 2011, 2011 6th International Conference for Internet Technology and Secured Transactions (ICITST), P323
[10]  
Forcier J., 2008, PYTHON WEB DEV DJANG