Using Unit Testing to Detect Sanitization Flaws

04/02/2018
by   Mahmoud Mohammadi, et al.
0

Input sanitization mechanisms are widely used to mitigate vulnerabilities to injection attacks such as cross-site scripting. Static analysis tools and techniques commonly used to ensure that applications utilize sanitization functions. Dynamic analysis must be to evaluate the correctness of sanitization functions. The proposed approach is based on unit testing to bring the advantages of both static and dynamic techniques to the development time. Our approach introduces a technique to automatically extract the sanitization functions and then evaluate their effectiveness against attacks using automatically generated attack vectors. The empirical results show that the proposed technique can detect security flaws cannot find by the static analysis tools.

READ FULL TEXT

page 1

page 2

page 3

research
04/02/2018

Automatic Web Security Unit Testing: XSS Vulnerability Detection

Integrating security testing into the workflow of software developers no...
research
04/02/2018

Detecting Cross-Site Scripting Vulnerabilities through Automated Unit Testing

The best practice to prevent Cross Site Scripting (XSS) attacks is to ap...
research
07/06/2022

Using Microservice Telemetry Data for System Dynamic Analysis

Microservices bring various benefits to software systems. They also brin...
research
05/28/2021

Accelerating JavaScript Static Analysis via Dynamic Shortcuts (Extended Version)

JavaScript has become one of the most widely used programming languages ...
research
03/07/2023

Combining static analysis and dynamic symbolic execution in a toolchain to detect fault injection vulnerabilities

Certification through auditing allows to ensure that critical embedded s...
research
10/08/2015

Exact Inference Techniques for the Analysis of Bayesian Attack Graphs

Attack graphs are a powerful tool for security risk assessment by analys...
research
05/31/2022

MAD-EN: Microarchitectural Attack Detection through System-wide Energy Consumption

Microarchitectural attacks have become more threatening the hardware sec...

Please sign up or login with your details

Forgot password? Click here to reset