2017 IEEE 17th International Conference on Communication Technology (ICCT) 2017
DOI: 10.1109/icct.2017.8359859
|View full text |Cite
|
Sign up to set email alerts
|

Path sensitive static analysis of taint-style vulnerabilities in PHP code

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…The proposed method reduced the error rate of XSS vulnerabilities. In 2019, YAN et al [6] proposed a PHP code vulnerability detection method based on sensitive path and taint analysis. The method first converted the background code of the web application into the intermediate representation of the code, such as the abstract syntax tree, then found the slot (dangerous function), then determined the sensitive path through the slot, and finally performed taint analysis on this path to determine whether the vulnerability exists.…”
Section: Related Workmentioning
confidence: 99%
“…The proposed method reduced the error rate of XSS vulnerabilities. In 2019, YAN et al [6] proposed a PHP code vulnerability detection method based on sensitive path and taint analysis. The method first converted the background code of the web application into the intermediate representation of the code, such as the abstract syntax tree, then found the slot (dangerous function), then determined the sensitive path through the slot, and finally performed taint analysis on this path to determine whether the vulnerability exists.…”
Section: Related Workmentioning
confidence: 99%
“…Evaluations need to be done to judge if the sanitizing of user input is effective, or there could be an XSS vulnerability. However, if an entire project requires auditing, the "source-filter-sink", i.e., the XSS triples, needs to be considered as a whole [34].…”
Section: Xss Triggering In Source Codementioning
confidence: 99%
“…To build the mapping relation between the data and the operation, call graph and control flow graph (CFG) are common approaches along with static taint checking. Static taint checking based approaches [39,40] were proposed to detect information leakage.…”
Section: Iirelated Workmentioning
confidence: 99%