Sciweavers

30
Voted
ICSE
2009
IEEE-ACM

Automatic creation of SQL Injection and cross-site scripting attacks

14 years 6 months ago
Automatic creation of SQL Injection and cross-site scripting attacks
We present a technique for finding security vulnerabilities in Web applications. SQL Injection (SQLI) and crosssite scripting (XSS) attacks are widespread forms of attack in which the attacker crafts the input to the application to access or modify user data and execute malicious code. In the most serious attacks (called second-order, or persistent, XSS), an attacker can corrupt a database so as to cause subsequent users to execute malicious code. This paper presents an automatic technique for creating inputs that expose SQLI and XSS vulnerabilities. The technique generates sample inputs, symbolically tracks taints through execution (including through database accesses), and mutates the inputs to produce concrete exploits. Ours is the first analysis of which we are aware that precisely addresses second-order XSS attacks. Our technique creates real attack vectors, has few false positives, incurs no runtime overhead for the deployed application, works without requiring modification o...
Adam Kiezun, Philip J. Guo, Karthick Jayaraman, Mi
Added 20 May 2010
Updated 20 May 2010
Type Conference
Year 2009
Where ICSE
Authors Adam Kiezun, Philip J. Guo, Karthick Jayaraman, Michael D. Ernst
Comments (0)