Security slicing for auditing XML, XPath, and SQL injection vulnerabilities
XML, XPath, and SQL injection vulnerabilities are among the most common and serious security issues for Web applications and Web services. Thus, it is important for security auditors to ensure that the implemented code is, to the extent possible, free from these vulnerabilities before deployment. Al...
Saved in:
Main Authors: | , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2015
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/4778 https://ink.library.smu.edu.sg/context/sis_research/article/5781/viewcontent/SecSlice_ISSRE15.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-5781 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-57812020-01-16T10:22:32Z Security slicing for auditing XML, XPath, and SQL injection vulnerabilities THOME, Julian SHAR, Lwin Khin BRIAND, Lionel XML, XPath, and SQL injection vulnerabilities are among the most common and serious security issues for Web applications and Web services. Thus, it is important for security auditors to ensure that the implemented code is, to the extent possible, free from these vulnerabilities before deployment. Although existing taint analysis approaches could automatically detect potential vulnerabilities in source code, they tend to generate many false warnings. Furthermore, the produced traces, i.e. dataflow paths from input sources to security-sensitive operations, tend to be incomplete or to contain a great deal of irrelevant information. Therefore, it is difficult to identify real vulnerabilities and determine their causes. One suitable approach to support security auditing is to compute a program slice for each security-sensitive operation, since it would contain all the information required for performing security audits (Soundness). A limitation, however, is that such slices may also contain information that is irrelevant to security (Precision), thus raising scalability issues for security audits. In this paper, we propose an approach to assist security auditors by defining and experimenting with pruning techniques to reduce original program slices to what we refer to as security slices, which contain sound and precise information. To evaluate the proposed pruning mechanism by using a number of open source benchmarks, we compared our security slices with the slices generated by a state-of-the-art program slicing tool. On average, our security slices are 80% smaller than the original slices, thus suggesting significant reduction in auditing costs. 2015-11-05T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/4778 info:doi/10.1109/ISSRE.2015.7381847 https://ink.library.smu.edu.sg/context/sis_research/article/5781/viewcontent/SecSlice_ISSRE15.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Security auditing static analysis vulnerability Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Security auditing static analysis vulnerability Information Security |
spellingShingle |
Security auditing static analysis vulnerability Information Security THOME, Julian SHAR, Lwin Khin BRIAND, Lionel Security slicing for auditing XML, XPath, and SQL injection vulnerabilities |
description |
XML, XPath, and SQL injection vulnerabilities are among the most common and serious security issues for Web applications and Web services. Thus, it is important for security auditors to ensure that the implemented code is, to the extent possible, free from these vulnerabilities before deployment. Although existing taint analysis approaches could automatically detect potential vulnerabilities in source code, they tend to generate many false warnings. Furthermore, the produced traces, i.e. dataflow paths from input sources to security-sensitive operations, tend to be incomplete or to contain a great deal of irrelevant information. Therefore, it is difficult to identify real vulnerabilities and determine their causes. One suitable approach to support security auditing is to compute a program slice for each security-sensitive operation, since it would contain all the information required for performing security audits (Soundness). A limitation, however, is that such slices may also contain information that is irrelevant to security (Precision), thus raising scalability issues for security audits. In this paper, we propose an approach to assist security auditors by defining and experimenting with pruning techniques to reduce original program slices to what we refer to as security slices, which contain sound and precise information. To evaluate the proposed pruning mechanism by using a number of open source benchmarks, we compared our security slices with the slices generated by a state-of-the-art program slicing tool. On average, our security slices are 80% smaller than the original slices, thus suggesting significant reduction in auditing costs. |
format |
text |
author |
THOME, Julian SHAR, Lwin Khin BRIAND, Lionel |
author_facet |
THOME, Julian SHAR, Lwin Khin BRIAND, Lionel |
author_sort |
THOME, Julian |
title |
Security slicing for auditing XML, XPath, and SQL injection vulnerabilities |
title_short |
Security slicing for auditing XML, XPath, and SQL injection vulnerabilities |
title_full |
Security slicing for auditing XML, XPath, and SQL injection vulnerabilities |
title_fullStr |
Security slicing for auditing XML, XPath, and SQL injection vulnerabilities |
title_full_unstemmed |
Security slicing for auditing XML, XPath, and SQL injection vulnerabilities |
title_sort |
security slicing for auditing xml, xpath, and sql injection vulnerabilities |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2015 |
url |
https://ink.library.smu.edu.sg/sis_research/4778 https://ink.library.smu.edu.sg/context/sis_research/article/5781/viewcontent/SecSlice_ISSRE15.pdf |
_version_ |
1770575028396490752 |