Business-Layer Session Puzzling Racer: Dynamic Security Testing Against Session Puzzling Race Conditions in Business Layer

被引:2
作者
Alidoosti, Mitra [1 ]
Nowroozi, Alireza [2 ]
Nickabadi, Ahmad [3 ]
机构
[1] Malek Ashtar Univ Tehran, Tehran, Iran
[2] IRIB Univ Tehran, Tehran, Iran
[3] Amirkabir Univ Tehran, Tehran, Iran
来源
ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY | 2022年 / 14卷 / 01期
关键词
Dynamic Testing; Vulnerability Analysis; Web Application; Business Process; Race Condition; LOGIC VULNERABILITIES;
D O I
10.22042/isecure.2021.272808.637
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Parallel execution of multiple threads of a web application will result in server-side races if the web application is not synchronized correctly. Server-side race is susceptible to flaws in the relation between the server and the database. Detecting the race condition in the web applications depends on the business logic of the application. No logic-aware approach has been presented to deal with race conditions. Furthermore, most existing approaches either result in DoS or are not applicable with false positive. In this study, the session puzzling race conditions existing in a web application are classified and described. In addition, we present Business-Layer Session Puzzling Racer, a black-box approach for dynamic application security testing, to detect the business-layer vulnerability of the application against session puzzling race conditions. Experiments on well-known and widely used web applications showed that Business-Layer Session Puzzling Racer is able to detect the business layer vulnerabilities of these applications against race conditions. In addition, the amount of traffic generated to identify the vulnerabilities has been improved by about 94.38% by identifying the business layer of the application. Thus, Business-Layer Session Puzzling Racer does not result in DoS. (C) 2020 ISC. All rights reserved.
引用
收藏
页码:83 / 104
页数:22
相关论文
共 43 条
[11]  
Chen S., 2011, SESS PUZZL SESS RAC
[12]  
Chen Y, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P747
[13]  
Dean D, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE 13TH USENIX SECURITY SYMPOSIUM, P195
[14]   DetLogic: A black-box approach for detecting logic vulnerabilities in web applications [J].
Deepa, G. ;
Thilagam, P. Santhi ;
Praseed, Amit ;
Pais, Alwyn R. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 109 :89-109
[15]  
Emous RJ., THESIS U 20
[16]   DETECTING NONDETERMINACY IN PARALLEL PROGRAMS [J].
EMRATH, PA ;
GHOSH, S ;
PADUA, DA .
IEEE SOFTWARE, 1992, 9 (01) :69-77
[17]  
Flanagan C, 2001, ACM SIGPLAN NOTICES, P90
[18]   Detecting application logic vulnerabilities via finding incompatibility between application design and implementation [J].
Ghorbanzadeh, Mahmoud ;
Shahriari, Hamid Reza .
IET SOFTWARE, 2020, 14 (04) :377-388
[19]  
Halfond W.G., 2006, P IEEE INT S SECURE, V1, P13
[20]  
Hallvord Reiar Michaelsen Steen, 2009, WEBS PLAYING TIM ROU