期刊文献+

一种自动化的跨站脚本漏洞发现模型 被引量:3

An Automated Cross-site Scripting Loopholes Discovery Model
下载PDF
导出
摘要 跨站脚本攻击给Web应用带来严重的威胁,在应用发布之前,对其进行检测能够有效地降低漏洞风险。针对现有跨站脚本在动态检测中存在漏报误报的问题,提出一种动态检测方法。基于攻击向量基本侯选元素库和初始攻击向量种子库,在检测过程中自动生成符合输出点类型的有效攻击向量,根据当前时刻的检测结果,自适应调整攻击向量优先级,待所有注入点攻击完毕,重新二次遍历整个站点检验待发现的漏洞。实验结果表明,与APPScan、WVS相比,该方法能发现更多漏洞。 Cross-site Scripting( XSS) attacks pose serious threats to web applications. Before the application is released,detecting them can effectively reduce the risk of vulnerabilities. Aiming at the problems in the current detection of cross-site scripting,such as missed reports and false alarms,a dynamic detection method is proposed. Based on the basic candidate element library of attack vectors and the initial attack vector seed library,an effective attack vector conforming to the output point type is automatically generated during the detection process. According to the detection result at the current moment,the priority of the attack vector is adaptively adjusted,and all the injection point attacks are performed,after finishing,it traverses the entire site twice to check the vulnerabilities to be discovered. Experimental results show that compared with APPScan、WVS,this method can find more vulnerabilities.
作者 马富天 钱雪忠 宋威 MA Futian ,QIAN Xuezhong,SONG Wei(Engineering Research Center of Internet of Things Technology Applications Ministry of Education, School of Intermet of Things Engineering, Jiangnan University,Wuxi,Jiangsu 214122 ,Chin)
出处 《计算机工程》 CAS CSCD 北大核心 2018年第8期167-173,共7页 Computer Engineering
基金 国家自然科学基金(61673193) 中央高校基本科研业务费专项资金(JUSRP51510 JUSRP51635B)
关键词 跨站脚本 动态检测 静态分析 攻击向量 合法向量 Cross-site Scripting ( XSS ) dynamic detection static analysis attack vector legal vector
  • 相关文献

参考文献4

二级参考文献28

  • 1Chinotec Technologies Company. Paros--for Web Application Security Assessment[EB/OL]. (2008-08-15). http://www, parosproxy. org/index,shtml.
  • 2OWASE OWASP Testing Project[EB/OL]. (2008-08-10). http:// www.owasp.org/.
  • 3Klein A. DOM Based Cross Site Scripting or XSS of the Third Kind[EB/OL]. (2008-07-28). http://www, Webappsec.org/projeets/ articles/071105.html,.
  • 4Fortify Software Inc.. Cross-site Scripting(XSS)[EB/OL]. (2008-04- 07). http://www.owasp.org/index.php/Cross-site Scripting_(XSS).
  • 5Ismail O, Etoh M, Kadobayashi Y. A Proposal and Implementation of Automatic Detection/Collection System for Cross-site Scripting Vulnerability[C]//Proc. of the 18th International Conference on Advanced Information Networking and Applications. Washington D C., USA: IEEE Computer Society. 2004.
  • 6Johns M, Engelmann B, Posegga J. XSSDS: server-side detection of cross-site scripting attacks[C-I,//Proceedings of Computer Security Applications Conference. IS. 1. ] : IEEE, 2008..335 - 344.
  • 7Klein A. DOM based cross site scripting or XSS of the third kind[-JT. Web Application Security Consortium, 2005,4:59 - 64.
  • 8Jovanovic N, Kruegel C, Kirda E. Pixy.. a static analysis tool for detecting Web application vulnerabilities [J-]. IEEE, 2006,126..258-263.
  • 9Artzi S, Kiezun A, Dolby J, et al. Finding bugs in dynamic web applications E C ff Proceedings of the 2008 International Symposium on Software Testing and Analysis. [-S. 1. 1: ACM, 2008:261 -272.
  • 10Vogt P, Nentwich F, Jovanovic N, et al. Cross site scripting prevention with dynamic data tainting and static analysis[C]//Proceedings of the Network and Dis- tributed System Security Symposium (NDSS). New York, USA..[s. n. ], 2007..95 - 102.

共引文献64

同被引文献26

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部