An Inferential Metamorphic Testing Approach to Reduce False Positives in SQLIV Penetration Test

被引:2
作者
Liu, Lei [1 ]
Su, Guoxin [2 ]
Xu, Jing [1 ]
Zhang, Biao [1 ]
Kang, Jiehui [1 ]
Xu, Sihan [1 ]
Li, Peng [1 ]
Si, Guannan [3 ]
机构
[1] Nankai Univ, Coll Comp & Control Engn, Tianjin, Peoples R China
[2] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW, Australia
[3] Shandong Jiaotong Univ, Sch Informat Sci & Elect Engn, Jinan, Shandong, Peoples R China
来源
2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1 | 2017年
基金
中国国家自然科学基金;
关键词
web vulnerability; penetration test; metamorphic testing; SQL injection; mutation testing; inference-based testing;
D O I
10.1109/COMPSAC.2017.276
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
SQL Injection Vulnerability (SQLIV) has been the top-ranked threat to the Web security consistently for many years. Penetration tests, which are a most widely adopted technique to detect SQLIV, are usually affected by testing inaccuracy. This problem is even worse in inference-based, blind penetration tests for online Web sites, where Web page variations (such as those caused by inbuilt dynamic modules or user interactions) may lead to a large number of False Positives (FP). We present a novel approach called Inferential Metamorphic Testing (IMT) to reduce FP in SQLIV penetration tests. First, we define the notion of Inferential Metamorphic Relations (IMR), which is inherited from Mutational Metamorphic Testing (MMT). Second, we present a set of logic operators and mutation operators for generating IMR and deducting the background testing context. Finally, we present an iterative IMT process, which is based on the heuristic IMR generation and the background testing context deduction. Our empirical study demonstrates the effectiveness of our approach by a comparison to three famous SQLIV penetration test tools.
引用
收藏
页码:675 / 680
页数:6
相关论文
共 14 条
[1]  
[Anonymous], P IEEE INT S SEC SOF
[2]   Assessing and Comparing Vulnerability Detection Tools for Web Services: Benchmarking Approach and Examples [J].
Antunes, Nuno ;
Vieira, Marco .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2015, 8 (02) :269-283
[3]   Detecting Vulnerabilities in Service Oriented Architectures [J].
Antunes, Nuno ;
Vieira, Marco .
23RD IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSRE 2012), 2012, :134-139
[4]  
Appelt D., 2014, P 2014 INT S SOFTW T, P259, DOI DOI 10.1145/2610384.2610403
[5]   Metamorphic Testing for Cybersecurity [J].
Chen, Tsong Yueh ;
Kuo, Fei-Ching ;
Ma, Wenjuan ;
Susilo, Willy ;
Towey, Dave ;
Voas, Jeffrey ;
Zhou, Zhi Quan .
COMPUTER, 2016, 49 (06) :48-55
[6]  
Ciampa A., 2010, P 2010 ICSE WORKSHOP, P43, DOI DOI 10.1145/1809100.1809107
[7]   Improving penetration testing through static and dynamic analysis [J].
Halfond, William G. J. ;
Choudhary, Shauvik Roy ;
Orso, Alessandro .
SOFTWARE TESTING VERIFICATION & RELIABILITY, 2011, 21 (03) :195-214
[8]   JFuzz: A Tool for Automated Java']Java Unit Testing Based on Data Mutation and Metamorphic Testing Methods [J].
Zhu, Hong .
2015 SECOND INTERNATIONAL CONFERENCE ON TRUSTWORTHY SYSTEMS AND THEIR APPLICATIONS, 2015, :120-127
[9]   A testing framework for Web application security assessment [J].
Huang, YW ;
Tsai, CH ;
Lin, TP ;
Huang, SK ;
Lee, DT ;
Kuo, SY .
COMPUTER NETWORKS, 2005, 48 (05) :739-761
[10]   Automatic Creation of SQL Injection and Cross-Site Scripting Attacks [J].
Kiezun, Adam ;
Guo, Philip J. ;
Jayaraman, Karthick ;
Ernst, Michael D. .
2009 31ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, PROCEEDINGS, 2009, :199-+