Article (Scientific journals)
Search-based Multi-Vulnerability Testing of XML Injections in Web Applications
Jan, Sadeeq; Panichella, Annibale; Arcuri, Andrea et al.
2019In Empirical Software Engineering, 24 (6), p. 3696–3729
Peer Reviewed verified by ORBi
 

Files


Full Text
Jan2019_Article_Search-basedMulti-vulnerabilit.pdf
Publisher postprint (2.55 MB)
Download

This article is distributed under the terms of the Creative Commons Attribution 4.0 Inter- national License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.


All documents in ORBilu are protected by a user license.

Send to



Details



Keywords :
vulnerabilities testing; XML injection; search-based software engineering
Abstract :
[en] Modern web applications often interact with internal web services, which are not directly accessible to users. However, malicious user inputs can be used to exploit security vulnerabilities in web services through the application front-ends. Therefore, testing techniques have been proposed to reveal security flaws in the interactions with back-end web services, e.g., XML Injections (XMLi). Given a potentially malicious message between a web application and web services, search-based techniques have been used to find input data to mislead the web application into sending such a message, possibly compromising the target web service. However, state-of-the-art techniques focus on (search for) one single malicious message at a time. Since, in practice, there can be many different kinds of malicious messages, with only a few of them which can possibly be generated by a given front-end, searching for one single message at a time is ineffective and may not scale. To overcome these limitations, we propose a novel co-evolutionary algorithm (COMIX) that is tailored to our problem and uncover multiple vulnerabilities at the same time. Our experiments show that COMIX outperforms a single-target search approach for XMLi and other multi-target search algorithms originally defined for white-box unit testing.
Research center :
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Software Verification and Validation Lab (SVV Lab)
Disciplines :
Computer science
Author, co-author :
Jan, Sadeeq ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
Panichella, Annibale ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
Arcuri, Andrea;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
Briand, Lionel ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
External co-authors :
yes
Language :
English
Title :
Search-based Multi-Vulnerability Testing of XML Injections in Web Applications
Publication date :
December 2019
Journal title :
Empirical Software Engineering
ISSN :
1573-7616
Publisher :
Springer, United States
Volume :
24
Issue :
6
Pages :
3696–3729
Peer reviewed :
Peer Reviewed verified by ORBi
Focus Area :
Security, Reliability and Trust
European Projects :
H2020 - 694277 - TUNE - Testing the Untestable: Model Testing of Complex Software-Intensive Systems
Name of the research project :
tune
Funders :
CE - Commission Européenne [BE]
Available on ORBilu :
since 19 March 2019

Statistics


Number of views
309 (41 by Unilu)
Number of downloads
206 (14 by Unilu)

Scopus citations®
 
12
Scopus citations®
without self-citations
9
OpenCitations
 
7
WoS citations
 
9

Bibliography


Similar publications



Contact ORBilu