Research on Vulnerability Detection for Software Based on Taint Analysis

Article Preview

Abstract:

At present, Cross Site Scripting (XSS) vulnerability exists in most web sites. The main reason is the lack of effective validation and filtering mechanisms for user input data from web request. This paper explores vulnerability detection method which based on taint dependence analysis and implements a prototype system for Java Web program. We treat all user input as tainted data, and track the flow of Web applications, then we judge whether it will trigger an attack or not. The taint dependent analysis algorithm mentioned in this paper is used to construct the taint dependency graph. Next the value representation method of the string tainted object based on finite state automata is discussed. Finally, we propose the vulnerability detection method for the program. The experiment result shows that the prototype system can detect reflection cross-site scripting vulnerability well in those programs which dont have effective treatment for the user input data.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3715-3720

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Paros, http: /www. parosproxy. org/index. shtml. (2009).

Google Scholar

[2] XSS-Me, http: /www. securitycompass. com/exploite. tml. (2009).

Google Scholar

[3] Xie Long. Research and Implementation of JSP cross-site scripting vulnerabilities static detection technology: [MS]. Guangzhou: Zhongshan University Librarian, (2011).

Google Scholar

[4] G. Wassermann, Zhendong Su. Static detection of cross-site scripting vulnerabilities. In: Proc. 2008 ACM/IEEE 30th International Conference on Software Engineering. Leipzig , 2008: 171-180.

DOI: 10.1145/1368088.1368112

Google Scholar

[5] Fang Yu, T. Butan et al. Symbolic String Verification: An Automata-based Approach. In: Proc. of the 15th International SPIN Workshop on Model Checking of Software. Los Angeles, 2008: 306-324.

Google Scholar

[6] A.S. Christensen, A. Møller, M. Schwartzbach. Precise Analysis of String Expressi- ons. In: Proc. of 10th International Symposium, SAS San Diego. 2003: 1-18.

Google Scholar