Detecting Cross-Site Scripting Vulnerability using Concolic Testing

被引:9
作者
Ruse, Michelle E. [1 ]
Basu, Samik [1 ]
机构
[1] Iowa State Univ, Dept Comp Sci, Ames, IA 50011 USA
来源
PROCEEDINGS OF THE 2013 10TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS | 2013年
关键词
Web Application Testing; Concolic testing; Vulnerability Detection; Web Program Analysis; Cross-Site Scripting; PREVENTION; INJECTION;
D O I
10.1109/ITNG.2013.97
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cross-Site Scripting (XSS) attack is a type of Web-based attack wherein a malicious script is executed (from an immediate injection or from a stored source) to steal information or gain unauthorized access to user/system resources. We propose a two-phase technique to detect XSS vulnerabilities and prevent XSS attacks. In the first phase, we translate the Web application to a language for which recently developed concolic testing tools are available. Our translation also identifies input and output variables that are used to generate test cases for determining input/output dependencies in the application. Dependencies indicate vulnerabilities in the application that can be potentially exploited when the application is deployed. In the second phase, based on the input/output dependencies determined in the first phase, we appropriately (automatically) instrument the application code by including monitors. The monitors check exploitation of vulnerabilities at runtime. In addition to being both as efficient and effective as the available XSS attack detection techniques, our two-phase method is also capable of identifying XSS vulnerabilities that occur due to (a) conditional copy (of inputs to outputs) and (b) construction of malicious string inputs from the concatenation of singularly benign inputs. We present a prototype implementation of our framework and demonstrate its effectiveness using non-trivial JSP Web applications.
引用
收藏
页码:633 / 638
页数:6
相关论文
共 19 条
[1]  
[Anonymous], 2010, OWASP 2010 TOP 10
[2]  
Artzi Shay., 2008, P 2008 INT S SOFTWAR, P261, DOI DOI 10.1145/1390630.1390662
[3]  
Bisht P, 2008, LECT NOTES COMPUT SC, V5137, P23, DOI 10.1007/978-3-540-70542-0_2
[4]   Testing and comparing web vulnerability scanning tools for SQL injection and XSS attacks [J].
Fonseca, Jose ;
Vieira, Marco ;
Madeira, Henrique .
13TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2007, :365-+
[5]  
Gundy M.V., 2009, NDSS
[6]  
Ismail O, 2004, 18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1 (LONG PAPERS), PROCEEDINGS, P145
[7]  
Jim Trevor., 2007, WWW 07, P601, DOI DOI 10.1145/1242572.1242654
[8]   Automatic Creation of SQL Injection and Cross-Site Scripting Attacks [J].
Kiezun, Adam ;
Guo, Philip J. ;
Jayaraman, Karthick ;
Ernst, Michael D. .
2009 31ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, PROCEEDINGS, 2009, :199-+
[9]  
Kirda E., 2006, Applied Computing 2006. 21st Annual ACM Symposium on Applied Computing, P330, DOI 10.1145/1141277.1141357
[10]  
Martin M.C., 2008, USENIX SECURITY S, P31