Multiple-path testing for cross site scripting using genetic algorithms

被引:22
作者
Ahmed, Moataz A. [1 ]
Ali, Fakhreldin [1 ]
机构
[1] King Fahd Univ Petr & Minerals, Informat & Comp Sci Dept, Dhahran 31261, Saudi Arabia
关键词
Web testing; Security testing; Cross-site scripting; Genetic algorithms;
D O I
10.1016/j.sysarc.2015.11.001
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Web applications suffer from different security vulnerabilities that could be exploited by hackers to cause harm in a variety of ways. A number of approaches have been proposed to test for such vulnerabilities. However, some gaps are still to be addressed. In this paper, we address one of such gaps: the problem of automatically generating test data (i.e., possible attacks) to test for cross site scripting (XSS) type of vulnerability. The objective is to generate a set of test data to exercise candidate security-vulnerable paths in a given script. The desirable set of test data must be effective in the sense that it uncovers whether any path can indeed be exploited to launch an attack. We designed a genetic algorithm-based test data generator that uses a database of XSS attack patterns to generate possible attacks and assess whether the attack is successful. We considered different types of XSS vulnerability: stored, reflected and DOM based. We empirically validated our test data generator using case studies of Web applications developed using PHP and MySQL. Empirical results show that our test data generator is effective in generating, in one run, multiple test data to cover multiple target paths. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:50 / 62
页数:13
相关论文
共 39 条
[1]   GA-based multiple paths test data generator [J].
Ahmed, Moataz A. ;
Hermadi, Irman .
COMPUTERS & OPERATIONS RESEARCH, 2008, 35 (10) :3107-3124
[2]  
Ali F., 2012, THESIS KING FAHD U P
[3]  
Alssir FT, 2012, ADV INTEL SOFT COMPU, V144, P163
[4]  
[Anonymous], 1990, 6101219901 IEEE
[5]  
Avancini A., 2010, Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure Systems. Cape Town, South Africa, P65, DOI DOI 10.1145/1809100.1809110
[6]   Static analysis for security [J].
Chess, B ;
McGraw, G .
IEEE SECURITY & PRIVACY, 2004, 2 (06) :76-79
[7]  
Chess B., 2007, Secure programming with static analysis
[8]   Testing Web-based applications: The state of the art and future trends [J].
Di Lucca, Giuseppe A. ;
Fasolino, Anna Rita .
INFORMATION AND SOFTWARE TECHNOLOGY, 2006, 48 (12) :1172-1186
[9]  
Dowd M., 2007, The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
[10]   Advances in Web Testing [J].
Eaton, Cyntrica ;
Memon, Atif M. .
ADVANCES IN COMPUTERS, VOL 75: COMPUTER PERFORMANCE ISSUES, 2009, 75 :281-306