Effective and scalable black-box fuzzing approach for modern web applications

被引:5
作者
Alsaedi, Aseel [1 ,2 ]
Alhuzali, Abeer [1 ]
Bamasag, Omaimah [1 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Comp Sci Dept, Jeddah, Saudi Arabia
[2] King Abdulaziz Univ, Fac Comput Informat Technol, Comp Sci Dept, Jeddah, Saudi Arabia
关键词
Black -box fuzzing; Web application security; Dynamic features; Vulnerability analysis; Dynamic analysis; Constraint solving; XQUERY INJECTION; VULNERABILITIES;
D O I
10.1016/j.jksuci.2022.10.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Web applications' security is critical because we share sensitive data through them frequently, which attracts attackers who exploit their vulnerabilities. Detecting and exploiting such vulnerabilities automatically is challenging because of the applications' increasing complexity and strong dependence upon dynamic features such as JavaScript. In this paper, we propose an approach that addresses the difficulties presented in web applications by using dynamic analysis techniques in a black-box fashion to explore applications' space. It also performs a client-side validation analysis to increase the coverage and therefore, identify more vulnerabilities. We implemented our approach with a tool and evaluated its effectiveness using real-world web applications. Our system discovered 207 unique URLs, submitted 102 web forms successfully, and exploited 32 vulnerabilities automatically. A detailed comparison of state-ofthe-art black-box fuzzing approaches showed that our system exceeds them in coverage, the number of vulnerabilities detected, and performance. (c) 2022 The Authors. Published by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页码:10068 / 10078
页数:11
相关论文
共 32 条
  • [1] Akrout Rim., 2014, Journal of the Brazilian Computer Society, V20, P4, DOI DOI 10.1186/1678-4804-20-4
  • [2] Automated Generation of Realistic Test Inputs for Web APIs
    Alonso, Juan C.
    [J]. PROCEEDINGS OF THE 29TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE '21), 2021, : 1666 - 1668
  • [3] Alsaedi A, 2021, INT J ADV COMPUT SC, V12, P849
  • [4] Artzi S, 2011, 2011 33RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), P571, DOI 10.1145/1985793.1985871
  • [5] Bassett G., 2021, TECH REP
  • [6] State of the Art: Automated Black-Box Web Application Vulnerability Testing
    Bau, Jason
    Bursztein, Elie
    Gupta, Divij
    Mitchell, John
    [J]. 2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, : 332 - 345
  • [7] Bennetts S., 2021, OWASP ZED ATTACK PRO
  • [8] Damele B., 2021, SQLMAP
  • [9] Z3: An efficient SMT solver
    de Moura, Leonardo
    Bjorner, Nikolaj
    [J]. TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, 2008, 4963 : 337 - 340
  • [10] DetLogic: A black-box approach for detecting logic vulnerabilities in web applications
    Deepa, G.
    Thilagam, P. Santhi
    Praseed, Amit
    Pais, Alwyn R.
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 109 : 89 - 109