Static Analysis Approaches to Detect SQL Injection and Cross Site Scripting Vulnerabilities in Web Applications: A Survey

被引:0
作者
Gupta, Mukesh Kumar [1 ]
Govil, M. C. [1 ]
Singh, Girdhari [1 ]
机构
[1] Malviya Natl Inst Technol, Dept Comp Engn, Jaipur, Rajasthan, India
来源
2014 RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE) | 2014年
关键词
web applicatio; static analysi; vulnerabilitie; SQL injection; cross site scripting;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Dependence on web applications is increasing very rapidly in recent time for social communications, health problem, financial transaction and many other purposes. Unfortunately, presence of security weaknesses in web applications allows malicious user's to exploit various security vulnerabilities and become the reason of their failure. Currently, SQL Injection (SQLl) and Cross-Site Scripting (XSS) vulnerabilities are most dangerous security vulnerabilities exploited in various popular web applications i.e. eBay, Google, Facebook, Twitter etc. Research on defensive programming, vulnerability detection and attack prevention techniques has been quite intensive in the past decade. Defensive programming is a set of coding guidelines to develop secure applications. But, mostly developers do not follow security guidelines and repeat same type of programming mistakes in their code. Attack prevention techniques protect the applications from attack during their execution in actual environment. The difficulties associated with accurate detection of SQLI and XSS vulnerabilities in coding phase of software development life cycle. This paper proposes a classification of software security approaches used to develop secure software in various phase of software development life cycle. It also presents a survey of static analysis based approaches to detect SQL Injection and cross-site scripting vulnerabilities in source code of web applications. The aim of these approaches is to identify the weaknesses in source code before their exploitation in actual environment. This paper would help researchers to note down future direction for securing legacy web applications in early phases of software development life cycle.
引用
收藏
页数:5
相关论文
共 26 条
  • [1] Agosta G., 2012, 9 INT C INF TECHN NE
  • [2] [Anonymous], P 13 INT WORLD WID W
  • [3] Atashzar H., 2011, Proceedings of the 2011 6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT 2011), P647
  • [4] Dynamic taint propagation: Finding vulnerabilities without attacking
    Chess, Brian
    West, Jacob
    [J]. Information Security Technical Report, 2008, 13 (01): : 33 - 39
  • [5] Cova Balzarotti, 2008, IEEE S SEC PRIV 18 2
  • [6] Elia I.A., 2010, IEEE 21 INT S SOFTW, P289
  • [7] Huang Jianjun, 2010, INF THEOR INF SEC IC, p[574, 577]
  • [8] Johari R., 2012, INT C COMM SYST NETW
  • [9] Jovanovic N., 2006, P IEEE S SEC PRIV MA
  • [10] Jovanovic N., 2006, SP 06