首页 > 最新文献

2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)最新文献

英文 中文
A Stochastic Petri net Model of Continuous Integration and Continuous Delivery 持续集成与持续交付的随机Petri网模型
Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00050
Sushovan Bhadra
Modern software development organizations rely on continuous integration and continuous delivery (CI/CD), since it allows developers to continuously integrate their code in a single shared repository and automates the delivery process of the product to the user. While modern software practices improve the performance of the software life cycle, they also increase the complexity of this process. Past studies make improvements to the performance of the CI/CD pipeline. However, there are fewer formal models to quantitatively guide process and product quality improvement or characterize how automated and human activities compose and interact asynchronously. Therefore, this paper develops a Petri net model to analyze a CI/CD pipeline to improve process performance in terms of the probability of successfully delivering new or updated functionality by a specified deadline. The utility of the model is demonstrated through a sensitivity analysis to identify stages of the pipeline where improvements would most significantly improve the probability of timely product delivery.
现代软件开发组织依赖于持续集成和持续交付(CI/CD),因为它允许开发人员在单个共享存储库中持续集成他们的代码,并将产品交付给用户的过程自动化。虽然现代软件实践提高了软件生命周期的性能,但它们也增加了这个过程的复杂性。过去的研究改进了CI/CD管道的性能。然而,很少有正式的模型来定量地指导过程和产品质量改进,或者描述自动化和人工活动如何组成和异步交互。因此,本文开发了一个Petri网模型来分析CI/CD管道,以在指定的截止日期前成功交付新功能或更新功能的可能性来改进过程性能。该模型的实用性是通过敏感性分析来证明的,以确定管道的各个阶段,在这些阶段,改进将最显著地提高产品及时交付的可能性。
{"title":"A Stochastic Petri net Model of Continuous Integration and Continuous Delivery","authors":"Sushovan Bhadra","doi":"10.1109/ISSREW55968.2022.00050","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00050","url":null,"abstract":"Modern software development organizations rely on continuous integration and continuous delivery (CI/CD), since it allows developers to continuously integrate their code in a single shared repository and automates the delivery process of the product to the user. While modern software practices improve the performance of the software life cycle, they also increase the complexity of this process. Past studies make improvements to the performance of the CI/CD pipeline. However, there are fewer formal models to quantitatively guide process and product quality improvement or characterize how automated and human activities compose and interact asynchronously. Therefore, this paper develops a Petri net model to analyze a CI/CD pipeline to improve process performance in terms of the probability of successfully delivering new or updated functionality by a specified deadline. The utility of the model is demonstrated through a sensitivity analysis to identify stages of the pipeline where improvements would most significantly improve the probability of timely product delivery.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121127355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Autonomic ZTA-based Network Management Engine (AZNME) 基于zta的自主网络管理引擎(AZNME)
Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00034
Cihan Tunc, James Durflinger, C. Mahmoudi, Valerio Formicola
The advancements in computer and networking technologies created closely connected cyberspaces. Nevertheless, this also invalidated many traditional and isolated/local network solutions and introduced higher cybersecurity risk. As a solution, NIST's Zero-Trust Architecture (ZTA) with “never trust, always verify” principle has been widely accepted; yet, its implementation, enforcement, and compliance-check mechanisms are still immature as the solutions are generally applied manually. In this paper, we present an autonomic computing based management engine for networking of a cyberspace, we refer as Autonomic ZTA-based Network Management Engine (AZNME), which monitors an asset's network connections, checks if these connections fulfill ZTA requirements, and evaluates trust continuously, and takes mitigation actions as needed. As a proof of concept, we implemented the AZNME focusing on active connections (e.g., IPs and ports) to enforce policies and create firewall rules based on trust evaluation.
计算机和网络技术的进步创造了紧密相连的网络空间。然而,这也使许多传统的、孤立的/本地网络解决方案失效,并带来了更高的网络安全风险。作为解决方案,NIST的零信任架构(ZTA)以“永不信任,永远验证”的原则被广泛接受;然而,它的实现、执行和遵从性检查机制仍然不成熟,因为解决方案通常是手动应用的。在本文中,我们提出了一个基于自主计算的网络空间网络管理引擎,我们称之为基于自治ZTA的网络管理引擎(AZNME),它监视资产的网络连接,检查这些连接是否满足ZTA要求,并持续评估信任,并根据需要采取缓解措施。作为概念验证,我们实现了专注于活动连接(例如,ip和端口)的AZNME,以执行策略并基于信任评估创建防火墙规则。
{"title":"Autonomic ZTA-based Network Management Engine (AZNME)","authors":"Cihan Tunc, James Durflinger, C. Mahmoudi, Valerio Formicola","doi":"10.1109/ISSREW55968.2022.00034","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00034","url":null,"abstract":"The advancements in computer and networking technologies created closely connected cyberspaces. Nevertheless, this also invalidated many traditional and isolated/local network solutions and introduced higher cybersecurity risk. As a solution, NIST's Zero-Trust Architecture (ZTA) with “never trust, always verify” principle has been widely accepted; yet, its implementation, enforcement, and compliance-check mechanisms are still immature as the solutions are generally applied manually. In this paper, we present an autonomic computing based management engine for networking of a cyberspace, we refer as Autonomic ZTA-based Network Management Engine (AZNME), which monitors an asset's network connections, checks if these connections fulfill ZTA requirements, and evaluates trust continuously, and takes mitigation actions as needed. As a proof of concept, we implemented the AZNME focusing on active connections (e.g., IPs and ports) to enforce policies and create firewall rules based on trust evaluation.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127031488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigating Novel Approaches to Defend Software Supply Chain Attacks 研究防御软件供应链攻击的新方法
Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00081
Md Jobair Hossain Faruk, Masrura Tasnim, H. Shahriar, Maria Valero, A. Rahman, Fan Wu
Software supply chain attacks occur during the processes of producing software is compromised, resulting in vulnerabilities that target downstream customers. While the number of successful exploits is limited, the impact of these attacks is significant. Despite increased awareness and research into software supply chain attacks, there is limited information available on mitigating or architecting for these risks, and existing information is focused on singular and independent elements of the supply chain. In this paper, we extensively review software supply chain security using software development tools and infrastructure. We investigate the path that attackers find is least resistant followed by adapting and finding the next best way to complete an attack. We also provide a thorough discussion on how common software supply chain attacks can be prevented, preventing malicious hackers from gaining access to an organization's development tools and infrastructure including the development environment. We considered various SSC attacks on stolen code-sign certificates by malicious attackers and prevented unnoticed malware from passing by security scanners. We are aiming to extend our research to contribute to preventing software supply chain attacks by proposing novel techniques and frameworks.
软件供应链攻击发生在生产软件被破坏的过程中,导致针对下游客户的漏洞。虽然成功利用的数量有限,但这些攻击的影响是巨大的。尽管对软件供应链攻击的认识和研究有所增加,但关于减轻或构建这些风险的可用信息有限,现有信息主要集中在供应链的单个和独立元素上。在本文中,我们使用软件开发工具和基础设施广泛地回顾了软件供应链安全。我们调查攻击者发现的阻力最小的路径,然后适应并找到完成攻击的下一个最佳方法。我们还对如何防止常见的软件供应链攻击进行了深入的讨论,以防止恶意黑客获得对组织的开发工具和基础设施(包括开发环境)的访问。我们考虑了恶意攻击者对被盗代码签名证书的各种SSC攻击,并阻止了安全扫描仪未注意到的恶意软件通过。我们的目标是扩展我们的研究,通过提出新的技术和框架来防止软件供应链攻击。
{"title":"Investigating Novel Approaches to Defend Software Supply Chain Attacks","authors":"Md Jobair Hossain Faruk, Masrura Tasnim, H. Shahriar, Maria Valero, A. Rahman, Fan Wu","doi":"10.1109/ISSREW55968.2022.00081","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00081","url":null,"abstract":"Software supply chain attacks occur during the processes of producing software is compromised, resulting in vulnerabilities that target downstream customers. While the number of successful exploits is limited, the impact of these attacks is significant. Despite increased awareness and research into software supply chain attacks, there is limited information available on mitigating or architecting for these risks, and existing information is focused on singular and independent elements of the supply chain. In this paper, we extensively review software supply chain security using software development tools and infrastructure. We investigate the path that attackers find is least resistant followed by adapting and finding the next best way to complete an attack. We also provide a thorough discussion on how common software supply chain attacks can be prevented, preventing malicious hackers from gaining access to an organization's development tools and infrastructure including the development environment. We considered various SSC attacks on stolen code-sign certificates by malicious attackers and prevented unnoticed malware from passing by security scanners. We are aiming to extend our research to contribute to preventing software supply chain attacks by proposing novel techniques and frameworks.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130613532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Investigating Bugs in AI-Infused Systems: Analysis and Proposed Taxonomy
Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00094
M. Kassab, J. Defranco, P. Laplante
Testing for critical AI systems is non-trivial as these systems are prone to a new breed of sophisticated software defects. The admissibility of these systems and their fundamental social acceptance is tightly coupled with assuring whether the potential hazards to humans, animals, and property posed by the prospect defects can be minimized and limited to an acceptable level. In this work, we address the problem of assurance for critical AI systems by firstly, analyzing the nature of defects that occur in AI -infused systems in general and how to combat these within a testing strategy. Secondly, developing a focused taxon-omy of prospect defects in critical AI systems. This taxonomy enables the development of the non-critical proxy (i.e., stand-in) equivalent by reproducing defects with similar characteristics.
对关键的人工智能系统进行测试是非常重要的,因为这些系统很容易出现新的复杂软件缺陷。这些系统的可接受性及其基本的社会接受度与确保是否可以将潜在缺陷对人类、动物和财产造成的潜在危害降至最低并将其限制在可接受的水平密切相关。在这项工作中,我们解决了关键人工智能系统的保证问题,首先,分析了人工智能注入系统中通常出现的缺陷的性质,以及如何在测试策略中解决这些问题。其次,对关键人工智能系统的潜在缺陷进行重点分类。这种分类法允许通过再现具有相似特征的缺陷来开发非关键代理(即,替代)等同物。
{"title":"Investigating Bugs in AI-Infused Systems: Analysis and Proposed Taxonomy","authors":"M. Kassab, J. Defranco, P. Laplante","doi":"10.1109/ISSREW55968.2022.00094","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00094","url":null,"abstract":"Testing for critical AI systems is non-trivial as these systems are prone to a new breed of sophisticated software defects. The admissibility of these systems and their fundamental social acceptance is tightly coupled with assuring whether the potential hazards to humans, animals, and property posed by the prospect defects can be minimized and limited to an acceptable level. In this work, we address the problem of assurance for critical AI systems by firstly, analyzing the nature of defects that occur in AI -infused systems in general and how to combat these within a testing strategy. Secondly, developing a focused taxon-omy of prospect defects in critical AI systems. This taxonomy enables the development of the non-critical proxy (i.e., stand-in) equivalent by reproducing defects with similar characteristics.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130733025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ISSRE 2022 Fast Abstracts Track Committee: ISSREW 2022 快速摘要跟踪委员会:ISSREW 2022
Pub Date : 2022-10-01 DOI: 10.1109/issrew55968.2022.00011
{"title":"ISSRE 2022 Fast Abstracts Track Committee: ISSREW 2022","authors":"","doi":"10.1109/issrew55968.2022.00011","DOIUrl":"https://doi.org/10.1109/issrew55968.2022.00011","url":null,"abstract":"","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131983848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An unsupervised approach to discover filtering rules from diagnostic logs 从诊断日志中发现过滤规则的无监督方法
Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00030
M. Cinque, Raffaele Della Corte, Giorgio Farina, Stefano Rosiello
Diagnostic logs represent the main source of in-formation about the system runtime. However, the presence of faults typically leads to multiple errors propagating within system components, which requires analysts to dig into cascading messages for root cause analysis. This is exacerbated in complex systems, such as railway systems, composed by several devices generating high amount of logs. Filtering allows dealing with large data volumes, leading practitioners to focus on interesting events, i.e., events that should be further investigated by analysts. This paper proposes an unsupervised approach to discover filtering rules from diagnostic logs. The approach automatically infers potential events correlations, representing them as fault-trees enriched with scores. Trees define filtering rules highlighting the interesting events, while scores allow prioritizing their anal-ysis. The approach has been applied in a preliminary railway case study, which encompasses more than 710k events generated by on-board train equipment during operation.
诊断日志表示有关系统运行时的主要信息来源。然而,故障的存在通常会导致多个错误在系统组件中传播,这需要分析人员深入研究级联消息以进行根本原因分析。在复杂的系统中,如铁路系统,由几个产生大量日志的设备组成,这种情况会加剧。过滤允许处理大量数据,引导从业者关注感兴趣的事件,即应该由分析人员进一步调查的事件。提出了一种从诊断日志中发现过滤规则的无监督方法。该方法自动推断潜在事件的相关性,将它们表示为带有分数的故障树。树定义了突出显示有趣事件的过滤规则,而分数允许对它们的分析进行优先级排序。该方法已应用于初步的铁路案例研究中,该研究涵盖了在运行期间由车载列车设备产生的710k多个事件。
{"title":"An unsupervised approach to discover filtering rules from diagnostic logs","authors":"M. Cinque, Raffaele Della Corte, Giorgio Farina, Stefano Rosiello","doi":"10.1109/ISSREW55968.2022.00030","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00030","url":null,"abstract":"Diagnostic logs represent the main source of in-formation about the system runtime. However, the presence of faults typically leads to multiple errors propagating within system components, which requires analysts to dig into cascading messages for root cause analysis. This is exacerbated in complex systems, such as railway systems, composed by several devices generating high amount of logs. Filtering allows dealing with large data volumes, leading practitioners to focus on interesting events, i.e., events that should be further investigated by analysts. This paper proposes an unsupervised approach to discover filtering rules from diagnostic logs. The approach automatically infers potential events correlations, representing them as fault-trees enriched with scores. Trees define filtering rules highlighting the interesting events, while scores allow prioritizing their anal-ysis. The approach has been applied in a preliminary railway case study, which encompasses more than 710k events generated by on-board train equipment during operation.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"906 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121302897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Message from the IWSF & SHIFT 2022 Chairs: ISSREW 2022 来自IWSF和SHIFT 2022主席的信息:ISSREW 2022
Pub Date : 2022-10-01 DOI: 10.1109/issrew55968.2022.00021
{"title":"Message from the IWSF & SHIFT 2022 Chairs: ISSREW 2022","authors":"","doi":"10.1109/issrew55968.2022.00021","DOIUrl":"https://doi.org/10.1109/issrew55968.2022.00021","url":null,"abstract":"","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121399898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WoSoCer 2022 Workshop Committee: ISSREW 2022 2022年世界足球锦标赛工作坊委员会:ISSREW 2022
Pub Date : 2022-10-01 DOI: 10.1109/issrew55968.2022.00016
{"title":"WoSoCer 2022 Workshop Committee: ISSREW 2022","authors":"","doi":"10.1109/issrew55968.2022.00016","DOIUrl":"https://doi.org/10.1109/issrew55968.2022.00016","url":null,"abstract":"","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126115599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RAIS 2022 Workshop Committee: ISSREW 2022 RAIS 2022工作坊委员会:ISSREW 2022
Pub Date : 2022-10-01 DOI: 10.1109/issrew55968.2022.00027
{"title":"RAIS 2022 Workshop Committee: ISSREW 2022","authors":"","doi":"10.1109/issrew55968.2022.00027","DOIUrl":"https://doi.org/10.1109/issrew55968.2022.00027","url":null,"abstract":"","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122593445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting and Defending CSRF at API-Level 在api级检测和防御CSRF
Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00043
Shun Wang, Chao Ni, Jianbo Wang, Changhai Nie
Cross-Site Request Forgery (CSRF) vulnerabilities are severe web vulnerabilities since their characteristics of extreme concealment and heavy harmfulness. However, they have received marginal attention from both the academic and the industry and the detection and protection of CSRF vulnerabilities are still performed predominantly manually. This paper proposes CSRFSolver for API-level CSRF detection and protection with two components: CSRF detector and CSRF defender. The former helps to identify and locate CSRF points where they need CSRF protection, and the latter provides CSRF protection by generating and verifying CSRFToken. We evaluate the effectiveness and efficiency of CSRFSolver on Cisco Webex public URL APIs with the state-of-the-art method. The results indicate that CSRFSolver can effectively and efficiently protect the system from CSRF attacks and have no side effects on systems' functionality. Meanwhile, the practical usefulness of CSRFSolver has also been verified through four years of deployment in Cisco Webex.
跨站点请求伪造(CSRF)漏洞具有隐蔽性强、危害性大的特点,是严重的web漏洞。然而,学术界和业界对CSRF漏洞的关注并不多,CSRF漏洞的检测和保护仍然主要是手工进行的。本文提出了用于api级CSRF检测和保护的CSRF求解器,它由两个部分组成:CSRF检测器和CSRF防御器。前者有助于识别和定位需要CSRF保护的CSRF点,后者通过生成和验证CSRFToken来提供CSRF保护。我们用最先进的方法评估了CSRFSolver在Cisco Webex公共URL api上的有效性和效率。结果表明,CSRFSolver可以有效地保护系统免受CSRF攻击,并且对系统的功能没有副作用。同时,CSRFSolver在Cisco Webex中四年的部署也验证了它的实用性。
{"title":"Detecting and Defending CSRF at API-Level","authors":"Shun Wang, Chao Ni, Jianbo Wang, Changhai Nie","doi":"10.1109/ISSREW55968.2022.00043","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00043","url":null,"abstract":"Cross-Site Request Forgery (CSRF) vulnerabilities are severe web vulnerabilities since their characteristics of extreme concealment and heavy harmfulness. However, they have received marginal attention from both the academic and the industry and the detection and protection of CSRF vulnerabilities are still performed predominantly manually. This paper proposes CSRFSolver for API-level CSRF detection and protection with two components: CSRF detector and CSRF defender. The former helps to identify and locate CSRF points where they need CSRF protection, and the latter provides CSRF protection by generating and verifying CSRFToken. We evaluate the effectiveness and efficiency of CSRFSolver on Cisco Webex public URL APIs with the state-of-the-art method. The results indicate that CSRFSolver can effectively and efficiently protect the system from CSRF attacks and have no side effects on systems' functionality. Meanwhile, the practical usefulness of CSRFSolver has also been verified through four years of deployment in Cisco Webex.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125659503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1