Finding SQL Injection and Cross Site Scripting Vulnerabilities with Diverse Static Analysis Tools

被引:15
作者
Algaith, Areej [1 ]
Nunes, Paulo [2 ]
Fonseca, Jose [2 ]
Gashi, Ilir [1 ]
Vieira, Marco [3 ]
机构
[1] City Univ London, Ctr Software Reliabil, London, England
[2] Univ Coimbra, CISUC, UDI, Polytech Inst Guarda, Coimbra, Portugal
[3] Univ Coimbra, Coimbra, Portugal
来源
2018 14TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2018) | 2018年
基金
英国工程与自然科学研究理事会; 欧盟地平线“2020”;
关键词
diversity analysis; security analysis; quantitative assessment; static analysis tools;
D O I
10.1109/EDCC.2018.00020
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The use of Static Analysis Tools (SATs) is mandatory when developing secure software and searching for vulnerabilities in legacy software. However, the performance of the various SATs concerning the detection of vulnerabilities and false alarm rate is usually unknown and depends on many factors. The simultaneous use of several tools should increase the detection capabilities, but also the number of false alarms. In this paper, we study the problem of combining several SATs to best meet the developer needs. We present results of analyzing the performance of diverse static analysis tools, based on a previously published dataset that resulted from the use of five diverse SATs to find two types of vulnerabilities, namely SQL Injections (SQLi) and Cross-Site Scripting (XSS), in 132 plugins of the WordPress Content Management System (CMS). We present the results based on well-established measures for binary classifiers, namely sensitivity and specificity for all possible diverse combinations that can be constructed using these 5 SAT tools. We then provide empirically supported guidance on which combinations of SAT tools provide the most benefits for detecting vulnerabilities with low false positive rates.
引用
收藏
页码:57 / 64
页数:8
相关论文
共 16 条
  • [1] [Anonymous], 2014, THOUGHT LEADERSHIP W
  • [2] [Anonymous], 2017, Technical Report
  • [3] Efficient and Flexible Discovery of PHP Application Vulnerabilities
    Backes, Michael
    Rieck, Konrad
    Skoruppa, Malte
    Stock, Ben
    Yamaguchi, Fabian
    [J]. 2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2017, : 334 - 349
  • [4] Dahse Johannes, 2014, S NETW DISTR SYST SE, P23
  • [5] Gupta Mukesh Kumar, 2014, International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014), P1
  • [6] Hauzar D., 2015, LEIBNIZ INT P INFORM, V37, P689, DOI [10.4230/LIPIcs.ECOOP.2015.689, DOI 10.4230/LIPICS.ECOOP.2015.689]
  • [7] Pixy: A static analysis tool for detecting Web application vulnerabilities - (Short paper)
    Jovanovic, Nenad
    Kruegel, Christopher
    Kirda, Engin
    [J]. 2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2006, : 258 - +
  • [8] Automatic Creation of SQL Injection and Cross-Site Scripting Attacks
    Kiezun, Adam
    Guo, Philip J.
    Jayaraman, Karthick
    Ernst, Michael D.
    [J]. 2009 31ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, PROCEEDINGS, 2009, : 199 - +
  • [9] Automatic Detection and Correction of Web Application Vulnerabilities using Data Mining to Predict False Positives
    Medeiros, Iberia
    Neves, Nuno F.
    Correia, Miguel
    [J]. WWW'14: PROCEEDINGS OF THE 23RD INTERNATIONAL CONFERENCE ON WORLD WIDE WEB, 2014, : 63 - 73
  • [10] An Approach to Merge Results of Multiple Static Analysis Tools
    Meng, Na
    Wang, Qianxiang
    Wu, Qian
    Mei, Hong
    [J]. QSIC 2008: PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE, 2008, : 169 - +