Automatic Detection and Correction of Web Application Vulnerabilities using Data Mining to Predict False Positives

被引:51
作者
Medeiros, Iberia [1 ]
Neves, Nuno F. [1 ]
Correia, Miguel [2 ]
机构
[1] Univ Lisbon, Fac Sci, LaSIGE, Lisbon, Portugal
[2] Univ Lisbon, Inst Super Tecn, INESC ID, Lisbon, Portugal
来源
WWW'14: PROCEEDINGS OF THE 23RD INTERNATIONAL CONFERENCE ON WORLD WIDE WEB | 2014年
关键词
Web applications; security; input validation vulnerabilities; false positives; source code analysis; automatic protection; software security; data mining;
D O I
10.1145/2566486.2568024
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Web application security is an important problem in today's internet. A major cause of this status is that many programmers do not have adequate knowledge about secure coding, so they leave applications with vulnerabilities. An approach to solve this problem is to use source code static analysis to find these bugs, but these tools are known to report many false positives that make hard the task of correcting the application. This paper explores the use of a hybrid of methods to detect vulnerabilities with less false positives. After an initial step that uses taint analysis to flag candidate vulnerabilities, our approach uses data mining to predict the existence of false positives. This approach reaches a trade-off between two apparently opposite approaches: humans coding the knowledge about vulnerabilities (for taint analysis) versus automatically obtaining that knowledge (with machine learning, for data mining). Given this more precise form of detection, we do automatic code correction by inserting fixes in the source code. The approach was implemented in the WAP tool (1) and an experimental evaluation was performed with a large set of open source PHP applications.
引用
收藏
页码:63 / 73
页数:11
相关论文
共 41 条
  • [1] [Anonymous], 2012, SYMANTEC INTERNET TH, V18
  • [2] [Anonymous], 1992, ACM LETT PROGRAM LAN
  • [3] [Anonymous], 2005, INPROCEEDINGS 20 IEE
  • [4] [Anonymous], 2012, 8 IMP
  • [5] Vulnerability Discovery with Attack Injection
    Antunes, Joao
    Neves, Nuno
    Correia, Miguel
    Verissimo, Paulo
    Neves, Rui
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2010, 36 (03) : 357 - 370
  • [6] A systematic and comprehensive investigation of methods to build and evaluate fault prediction models
    Arisholm, Erik
    Briand, Lionel C.
    Johannessen, Eivind B.
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (01) : 2 - 17
  • [7] Banabic Radu., 2012, Proceedings of the 7th ACM European Conference on Computer Systems. EuroSys'12, P281
  • [8] Bandhakavi S, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P12
  • [9] Exploring the relationships between design measures and software quality in object-oriented systems
    Briand, LC
    Wüst, J
    Daly, JW
    Porter, DV
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2000, 51 (03) : 245 - 273
  • [10] Buehrer G., 2005, P 5 INT WORKSH SOFTW, P106, DOI DOI 10.1145/1108473.1108496