HAXSS: Hierarchical Reinforcement Learning for XSS Payload Generation

被引:7
作者
Foley, Myles [1 ]
Maffeis, Sergio [1 ]
机构
[1] Imperial Coll London, Dept Comp, London, England
来源
2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM | 2022年
基金
英国工程与自然科学研究理事会;
关键词
Reinforcement Learning; Fuzzing; Web Application Security; XSS; GAME; GO;
D O I
10.1109/TrustCom56396.2022.00031
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Web application vulnerabilities are an ongoing problem that current black-box techniques and scanners do not entirely solve, suffering in particular from a lack of payload diversity that prevents them from capturing the long tail of vulnerabilities caused by uncommon sanitisation mistakes. In order to increase the diversity of payloads that can be automatically generated in a black-box fashion, we develop a hierarchical reinforcement learning approach where agents focus separately on the tasks of escaping the current context, and evading sanitisation. We implement this in an end-to-end prototype we call HAXSS. We compare our approach against a number of state-of-the-art black-box scanners on a new micro-benchmark for XSS payload generation, and on a macro-benchmark of established vulnerable web applications. HAXSS outperforms the other scanners on both benchmarks, identifying 131 vulnerabilities (a 20% improvement over the closest scanner), reporting 0 false positives. Finally, we demonstrate that our approach is practically useful, as HAXSS re-discovers 4 existing CVEs and discovers 5 new CVEs in 3 production-grade web applications.
引用
收藏
页码:147 / 158
页数:12
相关论文
共 34 条
  • [1] Alhuzali A, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P377
  • [2] An algorithm for detecting SQL injection vulnerability using black-box testing
    Aliero, Muhammad Saidu
    Ghani, Imran
    Qureshi, Kashif Naseer
    Rohani, Mohd Fo'ad
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (01) : 249 - 266
  • [3] Back in Black: Towards Formal, Black Box Analysis of Sanitizers and Filters
    Argyros, George
    Stais, Ioannis
    Kiayias, Aggelos
    Keromytis, Angelos D.
    [J]. 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, : 91 - 109
  • [4] Talking About My Generation: Targeted DOM-based XSS Exploit Generation using Dynamic Data Flow Analysis
    Bensalim, Souphiane
    Klein, David
    Barber, Thomas
    Johns, Martin
    [J]. PROCEEDINGS OF THE 14TH EUROPEAN WORKSHOP ON SYSTEMS SECURITY (EUROSEC 2021), 2021, : 27 - 33
  • [5] Berner C., 2019, ARXIV
  • [6] Brockman G, 2016, Arxiv, DOI [arXiv:1606.01540, DOI 10.48550/ARXIV.1606.01540]
  • [7] Burda Y, 2018, Arxiv, DOI arXiv:1810.12894
  • [8] Buyukkayhan A. S., 2020, RES ATTACKS INTRUSIO
  • [9] Discovering reflected cross-site scripting vulnerabilities using a multiobjective reinforcement learning environment
    Caturano, Francesco
    Perrone, Gaetano
    Romano, Simon Pietro
    [J]. COMPUTERS & SECURITY, 2021, 103
  • [10] Doupe A., 2012, USENIX SECURITY S