A Survey of Prevent and Detect Access Control Vulnerabilities

04/20/2023
by   Li Zhong, et al.
0

Broken access control is one of the most common security vulnerabilities in web applications. These vulnerabilities are the major cause of many data breach incidents, which result in privacy concern and revenue loss. However, preventing and detecting access control vulnerabilities proactively in web applications could be difficult. Currently, these vulnerabilities are actively detected by bug bounty hunters post-deployment, which creates attack windows for malicious access. To solve this problem proactively requires security awareness and expertise from developers, which calls for systematic solutions. This survey targets to provide a structured overview of approaches that tackle access control vulnerabilities. It firstly discusses the unique feature of access control vulnerabilities, then studies the existing works proposed to tackle access control vulnerabilities in web applications, which span the spectrum of software development from software design and implementation, software analysis and testing, and runtime monitoring. At last we discuss the open problem in this field.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/13/2022

Evaluation of Static Analysis on Web Applications

Web services are becoming business-critical components, often deployed w...
research
07/05/2022

An Exploratory Study on Regression Vulnerabilities

Background: Security regressions are vulnerabilities introduced in a pre...
research
05/23/2022

A Model-Driven-Engineering Approach for Detecting Privilege Escalation in IoT Systems

Software vulnerabilities in access control models can represent a seriou...
research
04/14/2022

A Study on Web Application Vulnerabilities to find an optimal Security Architecture

Over the past three decades, computers have managed to make their way in...
research
06/30/2022

Security and Privacy vulnerabilities of 5G/6G and WiFi 6: Survey and Research Directions from a Coexistence Perspective

Spectrum scarcity has been a major concern for achieving the desired qua...
research
01/26/2022

Automatic detection of access control vulnerabilities via API specification processing

Objective. Insecure Direct Object Reference (IDOR) or Broken Object Leve...
research
10/28/2014

A First Look at Firefox OS Security

With Firefox OS, Mozilla is making a serious push for an HTML5-based mob...

Please sign up or login with your details

Forgot password? Click here to reset