Proceedings 2014 Network and Distributed System Security Symposium 2014
DOI: 10.14722/ndss.2014.23021
|View full text |Cite
|
Sign up to set email alerts
|

Toward Black-Box Detection of Logic Flaws in Web Applications

Abstract: Abstract-Web applications play a very important role in many critical areas, including online banking, health care, and personal communication. This, combined with the limited security training of many web developers, makes web applications one of the most common targets for attackers.In the past, researchers have proposed a large number of white-and black-box techniques to test web applications for the presence of several classes of vulnerabilities. However, traditional approaches focus mostly on the detectio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
52
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 49 publications
(52 citation statements)
references
References 25 publications
0
52
0
Order By: Relevance
“…Similar attacks have also been detected in CaaS-enabled scenarios [35], [32]. For instance, a vulnerability in osCommerce v2.3.1 that allowed an attacker to shop for free has been reported in [32]: the attacker controls a SP and obtains an account identifier from PayPal for paying herself; later on, she replays this value in a subsequent session with a vulnerable SP where she purchases a product by paying herself. Recently, a token fixation attack in PayPal Express Checkout flow was discovered [18] which is very similar to the session fixation attack in OAuth 1.0 [10].…”
Section: Introductionmentioning
confidence: 67%
See 3 more Smart Citations
“…Similar attacks have also been detected in CaaS-enabled scenarios [35], [32]. For instance, a vulnerability in osCommerce v2.3.1 that allowed an attacker to shop for free has been reported in [32]: the attacker controls a SP and obtains an account identifier from PayPal for paying herself; later on, she replays this value in a subsequent session with a vulnerable SP where she purchases a product by paying herself. Recently, a token fixation attack in PayPal Express Checkout flow was discovered [18] which is very similar to the session fixation attack in OAuth 1.0 [10].…”
Section: Introductionmentioning
confidence: 67%
“…The aforementioned attacks have been discovered through a variety of domain-specific techniques with different levels of complexity, ranging from formal verification [23], white-box analysis [35], black-box testing [32], to manual testing [18]. In this paper, we pursue a different approach and propose an automatic black-box testing technique for security-critical MPWAs.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…In comparison, our approaches can cover not only these two attacks, but also forceful browsing attack. InteGuard [24] and EURECOM [25] attempt to secure multi-party web applications. LogicScope [26] , SENTINEL [6] and BLOCK [21] make use of session information to construct application specifications.…”
Section: Related Workmentioning
confidence: 99%