skip to main content
10.1145/775152.775174acmconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
Article

Web application security assessment by fault injection and behavior monitoring

Published:20 May 2003Publication History

ABSTRACT

As a large and complex application platform, the World Wide Web is capable of delivering a broad range of sophisticated applications. However, many Web applications go through rapid development phases with extremely short turnaround time, making it difficult to eliminate vulnerabilities. Here we analyze the design of Web application security assessment mechanisms in order to identify poor coding practices that render Web applications vulnerable to attacks such as SQL injection and cross-site scripting. We describe the use of a number of software-testing techniques (including dynamic analysis, black-box testing, fault injection, and behavior monitoring), and suggest mechanisms for applying these techniques to Web applications. Real-world situations are used to test a tool we named the Web Application Vulnerability and Error Scanner (WAVES, an open-source project available at http://waves.sourceforge.net) and to compare it with other tools. Our results show that WAVES is a feasible platform for assessing Web application security.

References

  1. Aladdin Knowledge Systems. "eSafe Proactive Content Security." http://www.ealaddin.com/Google ScholarGoogle Scholar
  2. Apache. "Cross Site Scripting Info." http://httpd.apache.org/info/css-security/Google ScholarGoogle Scholar
  3. Armstrong, I. "Mobile Code Stakes its Claim." In: SC Magazine, Cover Story, Nov 2000.Google ScholarGoogle Scholar
  4. Auronen, L. "Tool-Based Approach to Assessing Web Application Security." Helsinki University of Technology, Nov 2002.Google ScholarGoogle Scholar
  5. W3C. "Document Object Model (DOM)." http://www.w3.org/DOM/Google ScholarGoogle Scholar
  6. Anley Chris. "Advanced SQL Injection In SQL Server Applications." An NGSSoftware Insight Security Research (NISR) Publication, 2002.Google ScholarGoogle Scholar
  7. Apap, F., Honig, A., Hershkop, S. Eskin E., Stolfo S., "Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses." In: Fifth International Symposium on Recent Advances in Intrusion Detection (Zurich, Switzerland, Oct 2002). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Balzer, R., "Assuring the safety of opening email attachments." In: DARPA Information Survivability Conference & Exposition II, 2, 257--262, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  9. Benedikt M., Freire J., Godefroid P., "VeriWeb: Automatically Testing Dynamic Web Sites." In: Proceedings of the 11th International Conference on the World Wide Web (Honolulu, Hawaii, May 2002).Google ScholarGoogle Scholar
  10. Bergman, M. K. "The Deep Web: Surfacing Hidden Value." Deep Content Whitepaper, 2001.Google ScholarGoogle Scholar
  11. Bernaschi, M., Gabrielli, E., Mancini, L.V., "Operating system enhancements to prevent the misuse of system calls." In: Proceedings of the 7th ACM conference on Computer and communications security (Athens, Greece, 2000). Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Bowman, C. M., Danzig, P., Hardy, D., Manber, U., Schwartz, M., Wessels, D. "Harvest: A Scalable, Customizable Discovery and Access System." In: Technical Report CU-CS-732-94.", Department of Computer Science, University of Colorado, Boulder, 1995.Google ScholarGoogle Scholar
  13. Bowen, T., Segal, M., and Sekar, R. "On preventing intrusions by process behavior monitoring." In: Eighth USENIX Security Symposium (Washington, D.C., Aug 1999). Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Brabrand, C., Müller, A., M. I. "The <bigwig> project." ACM Transactions on Internet Technology, 2(2), 79--114, May 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. CERT. "CERT" Advisory CA-2000-02 Malicious HTML Tags Embedded in Client Web Requests. http://www.cgisecurity.com/articles/xss-faq.shtmlGoogle ScholarGoogle Scholar
  16. Cesar Cerrudo. "Manipulating Microsoft SQL Server Using SQL Injection." Whitepaper, 2002.Google ScholarGoogle Scholar
  17. CGISecurity. "The Cross Site Scripting FAQ."Google ScholarGoogle Scholar
  18. Chen, H., Wagner, D. "MOPS: an Infrastructure for Examining Security Properties of Software." In: ACM conference on computer and communication security (Washington, D.C., Nov 2002). Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Cho, J., Garcia-Molina, H. "Parallel Crawlers." In: Proceedings of the 11th International Conference on the World Wide Web (Honolulu, Hawaii, May 2002), 124--135. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Curphey et. al. Mark. "A Guide to Building Secure Web Applications." The Open Web Application Security Project, Sep 2002.Google ScholarGoogle Scholar
  21. DHTML Central. HierMenus. http://www.webreference.com/dhtml/hiermenus/Google ScholarGoogle Scholar
  22. Di Lucca, G.A.; Di Penta, M.; Antoniol, G.; Casazza, G. "An approach for reverse engineering of web-based applications." In: Proceedings of the Eighth Working Conference on Reverse Engineering (Stuttgart, Germany, Oct 2001), 231--240. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Di Lucca, G.A., Fasolino, A.R., Pace, F., Tramontana, P., De Carlini, U. "WARE: a tool for the reverse engineering of web applications." In: Proceedings of the Sixth European Conference on Software Maintenance and Reengineering (Budapest, Hungary, Mar 2002), 241--250. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Evans D., Larochelle, D. "Improving Security Using Extensible Lightweight Static Analysis." In: IEEE Software, Jan 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Finnigan, P., "SQL Injection and Oracle." SecurityFocus, 2002. http://online.securityfocus.com/infocus/1644Google ScholarGoogle Scholar
  26. Finjan Software. "Your Window of Vulnerability - Why Anti-Virus Isn't Enough." http://www.finjan.com/mcrc/overview.cfmGoogle ScholarGoogle Scholar
  27. Gold, R. "HttpUnit." http://httpunit.sourceforge.net/Google ScholarGoogle Scholar
  28. Hunt, G., Brubacher, D. "Detours: Binary Interception of Win32 Functions." In: USENIX Technical Program - Windows NT Symposium 99, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Ipeirotis P., Gravano L., "Distributed Search over the Hidden Web: Hierarchical Database Sampling and Selection." In: The 28th International Conference on Very Large Databases (Hong Kong, China, Aug 2002), 394--405. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Joshi, J., Aref, W., Ghafoor, A., Spafford, E. "Security Models for Web-Based Applications." Communications of the ACM, 44(2), 38--44, Feb 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Kaiya, H., Kaijiri, K. "Specifying runtime environments and functionalities of downloadable components under the sandbox model." In: Proceedings of the International Symposium on Principles of Software Evolution (Kanazawa, Japan, Nov 2000), 138--142.Google ScholarGoogle ScholarCross RefCross Ref
  32. KaVaDo. "Application-Layer Security: InterDo 2.1." KaVaDo Whitepaper, 2001.Google ScholarGoogle Scholar
  33. Ko, C., Fraser, T., Badger, L., Kilpatrick, D. "Detecting and Countering System Intrusions Using Software Wrappers." In: Proceedings of the 9th USENIX Security Symposium (Denver, Colorado, Aug 2000). Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Liddle, S., Embley, D., Scott, D., Yau, S.H., "Extracting Data Behind Web Forms." In: Proceedings of the Workshop on Conceptual Modeling Approaches for e-Business (Tampere, Finland, Oct 2002).Google ScholarGoogle Scholar
  35. Manber, U., Smith, M., Gopal B., "WebGlimpse - Combining Browsing and Searching." In: Proceedings of the USENIX 1997 Annual Technical Conference (Anaheim, California, Jan, 1997). Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Meer, H. "SQL Insertion," 2000.Google ScholarGoogle Scholar
  37. Microsoft. "Scriptlet Security." Getting Started with Scriptlets, MSDN Library, 1997. http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnindhtm/html/instantdhtmlscriptlets.aspGoogle ScholarGoogle Scholar
  38. Miller, R. C., Bharat, K. "SPHINX: A Framework for Creating Personal, Site-Specific Web Crawlers." In: Proceedings of the 7th International World Wide Web Conference (Brisbane, Australia, April 1998), 119--130. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Mozilla.org. "Mozilla Layout Engine." http://www.mozilla.org/newlayout/Google ScholarGoogle Scholar
  40. Netscape. "JavaScript Security in Communicator 4.x." http://developer.netscape.com/docs/manuals/communicator/jssec/contents.htm#1023448Google ScholarGoogle Scholar
  41. Offutt, J. "Quality Attributes of Web Software Applications." IEEE Software, 19(2), 25--32, Mar 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. OWASP. "WebScarab Project." http://www.owasp.org/webscarab/Google ScholarGoogle Scholar
  43. Pelican Security Inc. "Active Content Security: Risks and Solutions." Pelican Security Whitepaper, 1999.Google ScholarGoogle Scholar
  44. Privateer, P., "Making the Net Safe for eBusiness: Solving the Problem of Malicious Internet Mobile Code." In: Proceedings of the eSolutions World 2000 Conference (Philiadelphia, Pennsylvania, Sep 2000).Google ScholarGoogle Scholar
  45. Uppuluri, P., Sekar, R. "Experiences with Specification Based Intrusion Detection System." In: Fourth International Symposium on Recent Advances in Intrusion Detection (Davis, California, Oct. 2001). Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Raghavan, S., Garcia-Molina, H. "Crawling the Hidden Web." In: Proceedings of the 27th VLDB Conference (Roma, Italy, Sep 2001), 129--138. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Raghavan, S., Garcia-Molina, H. "Crawling the Hidden Web." In: Technical Report 2000-36, Database Group, Computer Science Department, Stanford (Nov 2000).Google ScholarGoogle Scholar
  48. Ricca, F., Tonella, P. "Analysis and Testing of Web Applications." In: Proceedings of the 23rd IEEE International Conference on Software Engineering (Toronto, Ontario, Canada, May 2001), 25--34. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Ricca, F., Tonella, P., Baxter, I. D. "Restructuring Web Applications via Transformation Rules." Information and Software Technology, 44(13), 811--825, Oct 2002.Google ScholarGoogle ScholarCross RefCross Ref
  50. Ricca, F., Tonella, P. "Understanding and Restructuring Web Sites with ReWeb." IEEE Multimedia, 8(2), 40--51, Apr 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Ricca, F., Tonella, P. "Web Application Slicing." In: Proceedings of the IEEE International Conference on Software Maintenance (Florence, Italy, Nov 2001), 148--157. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Ricca, F., Tonella, P. "Web Site Analysis: Structure and Evolution." In: Proceedings of the IEEE International Conference on Software Maintenance (San Jose, California, Oct 2000), 76--86. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Sanctum Inc. "Web Application Security Testing -- AppScan 3.5." http://www.sanctuminc.comGoogle ScholarGoogle Scholar
  54. Scott, D., Sharp, R. "Abstracting Application-Level Web Security." In: The 11th International Conference on the World Wide Web (Honolulu, Hawaii, May 2002), 396--407. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Sekar, R., Uppuluri, P., "Synthesizing Fast Intrusion Detection/Prevention Systems from High-Level Specifications." In: USENIX Security Symposium, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. [email protected]. "Larbin -- A Multi-Purpose Web Crawler." http://larbin.sourceforge.net/index-eng.htmlGoogle ScholarGoogle Scholar
  57. SecurityGlobal.net. Security Tracker Statistics. Apr 2002 -- Mar 2002. http://securitytracker.com/learn/statistics.htmlGoogle ScholarGoogle Scholar
  58. Shkapenyuk, V., Suel, T. "Design and Implementation of a High-Performance Distributed Web Crawler." In: Proceedings of the 18th IEEE International Conference on Data Engineering (San Jose, California, Feb 2002), 357--368. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. SPI Dynamics. "Complete Web Application Security: Phase 1"Building Web Application Security into Your Development Process." SPI Dynamics Whitepaper, 2002.Google ScholarGoogle Scholar
  60. SPI Dynamics. "SQL Injection: Are Your Web Applications Vulnerable." SPI Dynamics Whitepaper, 2002.Google ScholarGoogle Scholar
  61. SPI Dynamics. "Web Application Security Assessment." SPI Dynamics Whitepaper, 2003.Google ScholarGoogle Scholar
  62. Tennyson Maxwell Information Systems, Inc. "Teleport Webspiders." http://www.tenmax.com/teleport/home.htmGoogle ScholarGoogle Scholar
  63. Tilley, S., Huang, S. "Evaluating the Reverse Engineering Capabilities of Web Tools for Understanding Site Content and Structure: A Case Study." In: Proceedings of the 23rd IEEE International Conference on Software Engineering (Toronto, Ontario, Canada, May 2001), 514--523. Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. United States Patent and Trademark Office. http://www.uspto.gov/patft/Google ScholarGoogle Scholar
  65. Vibert, R., "AV Alternatives: Extending Scanner Range." In: Information Security Magazine, Feb 2001.Google ScholarGoogle Scholar
  66. Voas, J., McGraw, G., "Software Fault Injection: Inoculating Programs against Errors." John Wiley & Sons, 47--48, New York, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. WinMerge. "WinMerge: A visual text file differencing and merging tool for Win32 platforms." http://winmerge.sourceforge.netGoogle ScholarGoogle Scholar

Index Terms

  1. Web application security assessment by fault injection and behavior monitoring

                  Recommendations

                  Comments

                  Login options

                  Check if you have access through your login credentials or your institution to get full access on this article.

                  Sign in
                  • Published in

                    cover image ACM Conferences
                    WWW '03: Proceedings of the 12th international conference on World Wide Web
                    May 2003
                    772 pages
                    ISBN:1581136803
                    DOI:10.1145/775152

                    Copyright © 2003 ACM

                    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                    Publisher

                    Association for Computing Machinery

                    New York, NY, United States

                    Publication History

                    • Published: 20 May 2003

                    Permissions

                    Request permissions about this article.

                    Request Permissions

                    Check for updates

                    Qualifiers

                    • Article

                    Acceptance Rates

                    Overall Acceptance Rate1,899of8,196submissions,23%

                  PDF Format

                  View or Download as a PDF file.

                  PDF

                  eReader

                  View online with eReader.

                  eReader