Proceedings of the 7th International Workshop on Search-Based Software Testing 2014
DOI: 10.1145/2593833.2593835
|View full text |Cite
|
Sign up to set email alerts
|

Search-based security testing of web applications

Abstract: SQL injections are still the most exploited web application vulnerabilities. We present a technique to automatically detect such vulnerabilities through targeted test generation. Our approach uses search-based testing to systematically evolve inputs to maximize their potential to expose vulnerabilities. Starting from an entry URL, our BIOFUZZ prototype systematically crawls a web application and generates inputs whose effects on the SQL interaction are assessed at the interface between Web server and database.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
20
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 30 publications
(20 citation statements)
references
References 28 publications
0
20
0
Order By: Relevance
“…As the app is executed, screenshots and GUI-related metadata can be automatically extracted for each unique observed screen or layout of an app. Other similar automated GUI-ripping or crawling approaches can also be adapted for other platforms such as the web [77], [78], [79], [80], [81].…”
Section: Phase 21 -Large-scale Software Repository Mining and Dynamimentioning
confidence: 99%
“…As the app is executed, screenshots and GUI-related metadata can be automatically extracted for each unique observed screen or layout of an app. Other similar automated GUI-ripping or crawling approaches can also be adapted for other platforms such as the web [77], [78], [79], [80], [81].…”
Section: Phase 21 -Large-scale Software Repository Mining and Dynamimentioning
confidence: 99%
“…Thomé et al [68] proposed a search-based testing approach to detect SQL injection vulnerabilities in web applications. Their approach evolves inputs by assessing the effects on SQL interactions between the web server and database with the goal of exposing SQL injection vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%
“…Our work is also based on evolving test inputs but for XML injection instead of SQL. Moreover, Thomé et al [68] used a fitness function based on a number of factors to measure the likelihood of the SQLi attacks. Instead, we use a fitness function based on the distance between the SUT's outputs and test objectives based on attack patterns.…”
Section: Related Workmentioning
confidence: 99%
“…Challenges 2, 4, and 5 are addressed by security testing approaches [1,2,16,20,37] and dynamic analysis-based security attack detection approaches [10, 24, 31-33, 35, 36]. These approaches can be used to detect XSS, SQLi, XMLi, XPathi, and LDAPi vulnerabilities.…”
Section: Introductionmentioning
confidence: 99%
“…Challenge 6 is generally addressed by black-box security testing approaches [2,16,37] because they are agnostic with respect to the programming language of the system under test. However, this is the same reason for which these approaches cannot locate vulnerabilities in the source code (challenge 1).…”
Section: Introductionmentioning
confidence: 99%