Advertisement

Stranger: An Automata-Based String Analysis Tool for PHP

  • Fang Yu
  • Muath Alkhalaf
  • Tevfik Bultan
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6015)

Abstract

Stranger is an automata-based string analysis tool for finding and eliminating string-related security vulnerabilities in PHP applications. Stranger uses symbolic forward and backward reachability analyses to compute the possible values that the string expressions can take during program execution. Stranger can automatically (1) prove that an application is free from specified attacks or (2) generate vulnerability signatures that characterize all malicious inputs that can be used to generate attacks.

Keywords

Dependency Graph Reachability Analysis Strongly Connected Component Attack Pattern Vulnerability Signature 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Bartzis, C., Bultan, T.: Widening arithmetic automata. In: Alur, R., Peled, D.A. (eds.) CAV 2004. LNCS, vol. 3114, pp. 321–333. Springer, Heidelberg (2004)Google Scholar
  2. 2.
    BRICS. The MONA project, http://www.brics.dk/mona/
  3. 3.
    Christensen, A., Møller, A., Schwartzbach, M.: Precise analysis of string expressions. In: Cousot, R. (ed.) SAS 2003. LNCS, vol. 2694, pp. 1–18. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  4. 4.
    Jovanovic, N., Krügel, C., Kirda, E.: Pixy: A static analysis tool for detecting web application vulnerabilities (short paper). In: S&P, pp. 258–263 (2006)Google Scholar
  5. 5.
    Minamide, Y.: Static approximation of dynamically generated web pages. In: WWW, pp. 432–441 (2005)Google Scholar
  6. 6.
    OWASP. Top ten project (May 2007), http://www.owasp.org/
  7. 7.
    Wassermann, G., Su, Z.: Sound and precise analysis of web applications for injection vulnerabilities. In: PLDI, pp. 32–41 (2007)Google Scholar
  8. 8.
    Yu, F., Alkhalaf, M., Bultan, T.: Generating vulnerability signatures for string manipulating programs using automata-based forward and backward symbolic analyses. In: ASE (2009)Google Scholar
  9. 9.
    Yu, F., Bultan, T., Cova, M., Ibarra, O.H.: Symbolic string verification: An automata-based approach. In: Havelund, K., Majumdar, R., Palsberg, J. (eds.) SPIN 2008. LNCS, vol. 5156, pp. 306–324. Springer, Heidelberg (2008)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Fang Yu
    • 1
  • Muath Alkhalaf
    • 1
  • Tevfik Bultan
    • 1
  1. 1.Department of Computer ScienceUniversity of CaliforniaSanta BarbaraUSA

Personalised recommendations