LARGE LANGUAGE MODEL-BASED TESTING FOR CROSS-SITE SCRIPTING VULNERABILITIES

Cross-site scripting is one of the vulnerabilities that is always being published in the fourth last OWASP Top 10's publication. Moreover, cross-site scripting is the most reported vulnerability in CVEDetails' site. In fact, this vulnerability shows an increasing trend in the last ten y...

Full description

Saved in:
Bibliographic Details
Main Author: Ramadhana P. K., Rizky
Format: Final Project
Language:Indonesia
Online Access:https://digilib.itb.ac.id/gdl/view/82472
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Institut Teknologi Bandung
Language: Indonesia
id id-itb.:82472
spelling id-itb.:824722024-07-08T14:05:46ZLARGE LANGUAGE MODEL-BASED TESTING FOR CROSS-SITE SCRIPTING VULNERABILITIES Ramadhana P. K., Rizky Indonesia Final Project cross-site scripting, large language model, software testing INSTITUT TEKNOLOGI BANDUNG https://digilib.itb.ac.id/gdl/view/82472 Cross-site scripting is one of the vulnerabilities that is always being published in the fourth last OWASP Top 10's publication. Moreover, cross-site scripting is the most reported vulnerability in CVEDetails' site. In fact, this vulnerability shows an increasing trend in the last ten years. So, it can be concluded that a comprehensive testing mechanism is needed to prevent this vulnerability from happening. To address the prevalence of cross-site scripting vulnerabilities, many researches and tools have been made. However, those tools still have a high false positive rate and are dependent on the tech stack being used. For example, XSStrike is not confirming the vulnerabilities with an attack, not even being able to create a payload for DOM cross-site scripting. Another example comes from Mohammadi et al. (2017) that can only be used for software using JSP. This Final Project proposes a cross-site scripting detection tool that validates the vulnerability by directly attacking the target. By using payloads created by a large language model with the few-shot prompting technique, the tool proposed in this Final Project has a comparable performance as the baseline, XSStrike, in server cross-site scripting detection. Moreover, this tool outperforms XSStrike in client cross-site scripting detection. In short, this tool can detect 59 out of 92 cross-site scripting vulnerabilities in a testbed called Google Firing Range. The tool proposed can also reduce the false positive rate to zero in a test to open source software Airflow. All these performances are achieved with only $0.01 additional cost for each page tested. However, the automatic prompt engineering technique used in this Final Project is not exactly the same with the original theory and the small number of vulnerabilities tested in Airflow can be suggestions for next research. text
institution Institut Teknologi Bandung
building Institut Teknologi Bandung Library
continent Asia
country Indonesia
Indonesia
content_provider Institut Teknologi Bandung
collection Digital ITB
language Indonesia
description Cross-site scripting is one of the vulnerabilities that is always being published in the fourth last OWASP Top 10's publication. Moreover, cross-site scripting is the most reported vulnerability in CVEDetails' site. In fact, this vulnerability shows an increasing trend in the last ten years. So, it can be concluded that a comprehensive testing mechanism is needed to prevent this vulnerability from happening. To address the prevalence of cross-site scripting vulnerabilities, many researches and tools have been made. However, those tools still have a high false positive rate and are dependent on the tech stack being used. For example, XSStrike is not confirming the vulnerabilities with an attack, not even being able to create a payload for DOM cross-site scripting. Another example comes from Mohammadi et al. (2017) that can only be used for software using JSP. This Final Project proposes a cross-site scripting detection tool that validates the vulnerability by directly attacking the target. By using payloads created by a large language model with the few-shot prompting technique, the tool proposed in this Final Project has a comparable performance as the baseline, XSStrike, in server cross-site scripting detection. Moreover, this tool outperforms XSStrike in client cross-site scripting detection. In short, this tool can detect 59 out of 92 cross-site scripting vulnerabilities in a testbed called Google Firing Range. The tool proposed can also reduce the false positive rate to zero in a test to open source software Airflow. All these performances are achieved with only $0.01 additional cost for each page tested. However, the automatic prompt engineering technique used in this Final Project is not exactly the same with the original theory and the small number of vulnerabilities tested in Airflow can be suggestions for next research.
format Final Project
author Ramadhana P. K., Rizky
spellingShingle Ramadhana P. K., Rizky
LARGE LANGUAGE MODEL-BASED TESTING FOR CROSS-SITE SCRIPTING VULNERABILITIES
author_facet Ramadhana P. K., Rizky
author_sort Ramadhana P. K., Rizky
title LARGE LANGUAGE MODEL-BASED TESTING FOR CROSS-SITE SCRIPTING VULNERABILITIES
title_short LARGE LANGUAGE MODEL-BASED TESTING FOR CROSS-SITE SCRIPTING VULNERABILITIES
title_full LARGE LANGUAGE MODEL-BASED TESTING FOR CROSS-SITE SCRIPTING VULNERABILITIES
title_fullStr LARGE LANGUAGE MODEL-BASED TESTING FOR CROSS-SITE SCRIPTING VULNERABILITIES
title_full_unstemmed LARGE LANGUAGE MODEL-BASED TESTING FOR CROSS-SITE SCRIPTING VULNERABILITIES
title_sort large language model-based testing for cross-site scripting vulnerabilities
url https://digilib.itb.ac.id/gdl/view/82472
_version_ 1822997714598625280