Finding Security Vulnerabilities in Java Web Applications with Test Generation and Dynamic Taint Analysis

Part of the Advances in Intelligent and Soft Computing book series (AINSC, volume 145)

Abstract

This paper investigates how to combine techniques of static and dynamic analysis for finding security vulnerabilities in Java web applications. We present a hybrid analyzer that employs test case generation and dynamic taint analysis to achieve the goal of no false negatives and reduced false positives.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    OWASP. OWASP Top 10 for (2010), https://www.owasp.org/index.php/Top_10_2010-Main
  2. 2.
    Halfond, W.G., Viegas, J., Orso, A.: A Classification of SQL-Injection Attacks and Countermeasures. In: Proc. IEEE Int’l Sym. on Secure Software Engineering (March 2006)Google Scholar
  3. 3.
    CERT. Advisory CA-2002: Malicious HTML Tags Embedded in Client Web Requests (2002)Google Scholar
  4. 4.
    Livshits, V.B., Lam, M.S.: Finding security vulnerabilities in Java applications with static analysis. In: Proc. 14th Usenix Security Symposium, pp. 271–286 (August 2005)Google Scholar
  5. 5.
    Saxena, P., Akhawe, D., Hanna, S., Mao, F., McCamant, S., Song, D.: A Symbolic Execution Framework for JavaScrip. In: IEEE Sym. on Security and Privacy (May 2010)Google Scholar
  6. 6.
    Laddad, R.: AspectJ in Action. Manning Publications Co. (2003)Google Scholar
  7. 7.
    Chiang, S.L.: A Hybrid Security Analyzer for Java Web Applications, Master Thesis, National Chengchi University, Taiwan (July 2010)Google Scholar
  8. 8.
    Huang, Y.Y.: Test Case Generation for Verifying Security Vulnerabilities in Java Web Applications, Master Thesis, National Chengchi University, Taiwan (July 2011)Google Scholar
  9. 9.
    Monga, M., Paleari, R., Passerini, E.: A Hybrid Analysis Framework for Detecting Web Application Vulnerabilities. In: Proc. Workshop on Software Engineering for Secure Systems (IWSESS 2009), pp. 25–32 (2009)Google Scholar
  10. 10.
    Kieżun, A., Guo, P.J., Jayaraman, K., Ernst, M.D.: Automatic creation of SQL injection and cross-site scripting attacks. In: Proc. the 31st International Conference on Software Engineering (May 2009)Google Scholar

Copyright information

© Springer-Verlag GmbH Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.Department of Computer ScienceNational Chengchi UniversityChengchiTaiwan

Personalised recommendations