Search-based security testing of web applications

Julian Thomé, Alessandra Gorla, A. Zeller
{"title":"Search-based security testing of web applications","authors":"Julian Thomé, Alessandra Gorla, A. Zeller","doi":"10.1145/2593833.2593835","DOIUrl":null,"url":null,"abstract":"SQL injections are still the most exploited web application vulnerabilities. We present a technique to automatically detect such vulnerabilities through targeted test generation. Our approach uses search-based testing to systematically evolve inputs to maximize their potential to expose vulnerabilities. Starting from an entry URL, our BIOFUZZ prototype systematically crawls a web application and generates inputs whose effects on the SQL interaction are assessed at the interface between Web server and database. By evolving those inputs whose resulting SQL interactions show best potential, BIOFUZZ exposes vulnerabilities on real-world Web applications within minutes. As a black-box approach, BIOFUZZ requires neither analysis nor instrumentation of server code; however, it even outperforms state-of-the-art white-box vulnerability scanners.","PeriodicalId":424286,"journal":{"name":"International Workshop on Search-Based Software Testing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Workshop on Search-Based Software Testing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2593833.2593835","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14

Abstract

SQL injections are still the most exploited web application vulnerabilities. We present a technique to automatically detect such vulnerabilities through targeted test generation. Our approach uses search-based testing to systematically evolve inputs to maximize their potential to expose vulnerabilities. Starting from an entry URL, our BIOFUZZ prototype systematically crawls a web application and generates inputs whose effects on the SQL interaction are assessed at the interface between Web server and database. By evolving those inputs whose resulting SQL interactions show best potential, BIOFUZZ exposes vulnerabilities on real-world Web applications within minutes. As a black-box approach, BIOFUZZ requires neither analysis nor instrumentation of server code; however, it even outperforms state-of-the-art white-box vulnerability scanners.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于搜索的web应用程序安全测试
SQL注入仍然是最容易被利用的web应用程序漏洞。我们提出了一种通过目标测试生成来自动检测此类漏洞的技术。我们的方法使用基于搜索的测试来系统地进化输入,以最大化其暴露漏洞的潜力。从一个输入URL开始,我们的BIOFUZZ原型系统地爬取一个web应用程序并生成输入,这些输入对SQL交互的影响在web服务器和数据库之间的接口进行评估。通过演化那些最终SQL交互显示出最佳潜力的输入,BIOFUZZ可以在几分钟内暴露真实Web应用程序中的漏洞。作为一种黑盒方法,BIOFUZZ既不需要分析也不需要检测服务器代码;然而,它甚至胜过最先进的白盒漏洞扫描器。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Root cause analysis for HTML presentation failures using search-based techniques A hybrid test optimization framework using memetic algorithm with cuckoo flocking based search approach Model based test case generation with metaheuristics for networks of timed automata Test generation across multiple layers Search based techniques for software fault prediction: current trends and future directions
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1