Security slicing for auditing XML, XPath, and SQL injection vulnerabilities

XML, XPath, and SQL injection vulnerabilities are among the most common and serious security issues for Web applications and Web services. Thus, it is important for security auditors to ensure that the implemented code is, to the extent possible, free from these vulnerabilities before deployment. Al...

Full description

Saved in:
Bibliographic Details
Main Authors: THOME, Julian, SHAR, Lwin Khin, BRIAND, Lionel
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2015
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/4778
https://ink.library.smu.edu.sg/context/sis_research/article/5781/viewcontent/SecSlice_ISSRE15.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-5781
record_format dspace
spelling sg-smu-ink.sis_research-57812020-01-16T10:22:32Z Security slicing for auditing XML, XPath, and SQL injection vulnerabilities THOME, Julian SHAR, Lwin Khin BRIAND, Lionel XML, XPath, and SQL injection vulnerabilities are among the most common and serious security issues for Web applications and Web services. Thus, it is important for security auditors to ensure that the implemented code is, to the extent possible, free from these vulnerabilities before deployment. Although existing taint analysis approaches could automatically detect potential vulnerabilities in source code, they tend to generate many false warnings. Furthermore, the produced traces, i.e. dataflow paths from input sources to security-sensitive operations, tend to be incomplete or to contain a great deal of irrelevant information. Therefore, it is difficult to identify real vulnerabilities and determine their causes. One suitable approach to support security auditing is to compute a program slice for each security-sensitive operation, since it would contain all the information required for performing security audits (Soundness). A limitation, however, is that such slices may also contain information that is irrelevant to security (Precision), thus raising scalability issues for security audits. In this paper, we propose an approach to assist security auditors by defining and experimenting with pruning techniques to reduce original program slices to what we refer to as security slices, which contain sound and precise information. To evaluate the proposed pruning mechanism by using a number of open source benchmarks, we compared our security slices with the slices generated by a state-of-the-art program slicing tool. On average, our security slices are 80% smaller than the original slices, thus suggesting significant reduction in auditing costs. 2015-11-05T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/4778 info:doi/10.1109/ISSRE.2015.7381847 https://ink.library.smu.edu.sg/context/sis_research/article/5781/viewcontent/SecSlice_ISSRE15.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Security auditing static analysis vulnerability Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Security auditing
static analysis
vulnerability
Information Security
spellingShingle Security auditing
static analysis
vulnerability
Information Security
THOME, Julian
SHAR, Lwin Khin
BRIAND, Lionel
Security slicing for auditing XML, XPath, and SQL injection vulnerabilities
description XML, XPath, and SQL injection vulnerabilities are among the most common and serious security issues for Web applications and Web services. Thus, it is important for security auditors to ensure that the implemented code is, to the extent possible, free from these vulnerabilities before deployment. Although existing taint analysis approaches could automatically detect potential vulnerabilities in source code, they tend to generate many false warnings. Furthermore, the produced traces, i.e. dataflow paths from input sources to security-sensitive operations, tend to be incomplete or to contain a great deal of irrelevant information. Therefore, it is difficult to identify real vulnerabilities and determine their causes. One suitable approach to support security auditing is to compute a program slice for each security-sensitive operation, since it would contain all the information required for performing security audits (Soundness). A limitation, however, is that such slices may also contain information that is irrelevant to security (Precision), thus raising scalability issues for security audits. In this paper, we propose an approach to assist security auditors by defining and experimenting with pruning techniques to reduce original program slices to what we refer to as security slices, which contain sound and precise information. To evaluate the proposed pruning mechanism by using a number of open source benchmarks, we compared our security slices with the slices generated by a state-of-the-art program slicing tool. On average, our security slices are 80% smaller than the original slices, thus suggesting significant reduction in auditing costs.
format text
author THOME, Julian
SHAR, Lwin Khin
BRIAND, Lionel
author_facet THOME, Julian
SHAR, Lwin Khin
BRIAND, Lionel
author_sort THOME, Julian
title Security slicing for auditing XML, XPath, and SQL injection vulnerabilities
title_short Security slicing for auditing XML, XPath, and SQL injection vulnerabilities
title_full Security slicing for auditing XML, XPath, and SQL injection vulnerabilities
title_fullStr Security slicing for auditing XML, XPath, and SQL injection vulnerabilities
title_full_unstemmed Security slicing for auditing XML, XPath, and SQL injection vulnerabilities
title_sort security slicing for auditing xml, xpath, and sql injection vulnerabilities
publisher Institutional Knowledge at Singapore Management University
publishDate 2015
url https://ink.library.smu.edu.sg/sis_research/4778
https://ink.library.smu.edu.sg/context/sis_research/article/5781/viewcontent/SecSlice_ISSRE15.pdf
_version_ 1770575028396490752