Locality-Sensitive Hashing for Efficient Web Application Security Testing

01/04/2020
by   Ilan Ben-Bassat, et al.
0

Web application security has become a major concern in recent years, as more and more content and services are available online. A useful method for identifying security vulnerabilities is black-box testing, which relies on an automated crawling of web applications. However, crawling Rich Internet Applications (RIAs) is a very challenging task. One of the key obstacles crawlers face is the state similarity problem: how to determine if two client-side states are equivalent. As current methods do not completely solve this problem, a successful scan of many real-world RIAs is still not possible. We present a novel approach to detect redundant content for security testing purposes. The algorithm applies locality-sensitive hashing using MinHash sketches in order to analyze the Document Object Model (DOM) structure of web pages, and to efficiently estimate similarity between them. Our experimental results show that this approach allows a successful scan of RIAs that cannot be crawled otherwise.

READ FULL TEXT
research
04/27/2018

Extracting Parallel Paragraphs from Common Crawl

Most of the current methods for mining parallel texts from the web assum...
research
04/05/2019

A Visual Model for Web Applications Security Monitoring

This paper proposes a novel visual model for web applications security m...
research
10/01/2021

A Step Towards On-Path Security Function Outsourcing

Security function outsourcing has witnessed both research and deployment...
research
10/27/2021

Automated Evaluation of Web Site Accessibility Using A Dynamic Accessibility Measurement Crawler

Achieving accessibility compliance is extremely important for many gover...
research
06/27/2021

Darker than Black-Box: Face Reconstruction from Similarity Queries

Several methods for inversion of face recognition models were recently p...
research
08/23/2023

DarkDiff: Explainable web page similarity of TOR onion sites

In large-scale data analysis, near-duplicates are often a problem. For e...
research
04/14/2022

A Study on Web Application Vulnerabilities to find an optimal Security Architecture

Over the past three decades, computers have managed to make their way in...

Please sign up or login with your details

Forgot password? Click here to reset