Cargando…

Search-based multi-vulnerability testing of XML injections in web applications

Modern web applications often interact with internal web services, which are not directly accessible to users. However, malicious user inputs can be used to exploit security vulnerabilities in web services through the application front-ends. Therefore, testing techniques have been proposed to reveal...

Descripción completa

Detalles Bibliográficos
Autores principales: Jan, Sadeeq, Panichella, Annibale, Arcuri, Andrea, Briand, Lionel
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer US 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7357726/
https://www.ncbi.nlm.nih.gov/pubmed/32684796
http://dx.doi.org/10.1007/s10664-019-09707-8
_version_ 1783558723660152832
author Jan, Sadeeq
Panichella, Annibale
Arcuri, Andrea
Briand, Lionel
author_facet Jan, Sadeeq
Panichella, Annibale
Arcuri, Andrea
Briand, Lionel
author_sort Jan, Sadeeq
collection PubMed
description Modern web applications often interact with internal web services, which are not directly accessible to users. However, malicious user inputs can be used to exploit security vulnerabilities in web services through the application front-ends. Therefore, testing techniques have been proposed to reveal security flaws in the interactions with back-end web services, e.g., XML Injections (XMLi). Given a potentially malicious message between a web application and web services, search-based techniques have been used to find input data to mislead the web application into sending such a message, possibly compromising the target web service. However, state-of-the-art techniques focus on (search for) one single malicious message at a time. Since, in practice, there can be many different kinds of malicious messages, with only a few of them which can possibly be generated by a given front-end, searching for one single message at a time is ineffective and may not scale. To overcome these limitations, we propose a novel co-evolutionary algorithm (COMIX) that is tailored to our problem and uncover multiple vulnerabilities at the same time. Our experiments show that COMIX outperforms a single-target search approach for XMLi and other multi-target search algorithms originally defined for white-box unit testing.
format Online
Article
Text
id pubmed-7357726
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher Springer US
record_format MEDLINE/PubMed
spelling pubmed-73577262020-07-16 Search-based multi-vulnerability testing of XML injections in web applications Jan, Sadeeq Panichella, Annibale Arcuri, Andrea Briand, Lionel Empir Softw Eng Article Modern web applications often interact with internal web services, which are not directly accessible to users. However, malicious user inputs can be used to exploit security vulnerabilities in web services through the application front-ends. Therefore, testing techniques have been proposed to reveal security flaws in the interactions with back-end web services, e.g., XML Injections (XMLi). Given a potentially malicious message between a web application and web services, search-based techniques have been used to find input data to mislead the web application into sending such a message, possibly compromising the target web service. However, state-of-the-art techniques focus on (search for) one single malicious message at a time. Since, in practice, there can be many different kinds of malicious messages, with only a few of them which can possibly be generated by a given front-end, searching for one single message at a time is ineffective and may not scale. To overcome these limitations, we propose a novel co-evolutionary algorithm (COMIX) that is tailored to our problem and uncover multiple vulnerabilities at the same time. Our experiments show that COMIX outperforms a single-target search approach for XMLi and other multi-target search algorithms originally defined for white-box unit testing. Springer US 2019-04-13 2019 /pmc/articles/PMC7357726/ /pubmed/32684796 http://dx.doi.org/10.1007/s10664-019-09707-8 Text en © The Author(s) 2019, corrected publication 2019 Open AccessThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
spellingShingle Article
Jan, Sadeeq
Panichella, Annibale
Arcuri, Andrea
Briand, Lionel
Search-based multi-vulnerability testing of XML injections in web applications
title Search-based multi-vulnerability testing of XML injections in web applications
title_full Search-based multi-vulnerability testing of XML injections in web applications
title_fullStr Search-based multi-vulnerability testing of XML injections in web applications
title_full_unstemmed Search-based multi-vulnerability testing of XML injections in web applications
title_short Search-based multi-vulnerability testing of XML injections in web applications
title_sort search-based multi-vulnerability testing of xml injections in web applications
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7357726/
https://www.ncbi.nlm.nih.gov/pubmed/32684796
http://dx.doi.org/10.1007/s10664-019-09707-8
work_keys_str_mv AT jansadeeq searchbasedmultivulnerabilitytestingofxmlinjectionsinwebapplications
AT panichellaannibale searchbasedmultivulnerabilitytestingofxmlinjectionsinwebapplications
AT arcuriandrea searchbasedmultivulnerabilitytestingofxmlinjectionsinwebapplications
AT briandlionel searchbasedmultivulnerabilitytestingofxmlinjectionsinwebapplications