期刊文献+

基于AST分析与Fuzzing的反射型XSS漏洞识别模型

Reflective XSS Vulnerability Identification Model Based on AST Analysis and Fuzzing
下载PDF
导出
摘要 针对Web应用中反射型XSS检测效率较低、误报率较高的问题,提出一种基于AST分析和Fuzzing的反射型XSS漏洞识别模型。通过发送探针载荷请求目标Web页面,根据AST语法树解析结果,初步判定该Web页面存在反射型XSS漏洞的可能性。再根据探针载荷回显位置确认该页面中可疑XSS注入点,选择对应的逃逸技术和逃逸行为生成初始攻击载荷。将初始攻击载荷与绕过规则库相结合,生成攻击向量库,对可疑注入点进行Fuzzing,以确认是否存在反射型XSS漏洞。实验结果表明,相较于Burp Suite和AWVS,在相同漏洞环境中,此模型检测时平均请求次数较少。在保证较低误报率的同时,有较高的检测效率。 In view of the low detection efficiency and high false alarm rate of reflected XSS in Web applications,a reflected XSS vulnerability identification model based on AST analysis and Fuzzing is proposed.By sending the probe payload to request the target Web page,and according to the analysis result of the AST syntax tree,it is preliminarily determined that the Web page has the possibility of reflected XSS vulnerabilities.Then we confirm the suspicious XSS injection point in the Web page according to the echo position of the probe payload,and select the corresponding escape technology and escape behavior to generate the initial attack payload.The initial attack load is combined with the bypass rule library to generate an attack vector library,and fuzz the suspiciousinjection points to confirm whether there is a reflected XSS vulnerability.Experimental results show that compared with the Burp Suite and AWVS,in the same vulnerability environment,the average number of requests during detection is less.Itensuresa low false alarm rate,andhas a high detection efficiency.
作者 郭晓军 闫宇辰 吴志浩 GUO Xiaojun;YAN Yuchen;WU Zhihao(School of Information Engineering,Xizang Minzu University,Xianyang 712082,Shaanxi,China;Key Laboratory of Optical Information Processing and Visualization Technology of Tibet Autonomous Region,Xizang Minzu University,Xianyang 712082,Shaanxi,China)
出处 《实验室研究与探索》 CAS 北大核心 2022年第10期49-53,共5页 Research and Exploration In Laboratory
基金 西藏自治区自然科学基金项目(XZ2019ZRG-36(Z)) 西藏民族大学项目(324011810216,324042000709)。
关键词 漏洞检测 反射型XSS漏洞 AST分析 模糊测试 攻击载荷 vulnerability detection reflected XSS vulnerability AST analysis fuzzing attack payload
  • 相关文献

参考文献10

二级参考文献40

  • 1Johns M, Engelmann B, Posegga J. XSSDS: server-side detection of cross-site scripting attacks[C-I,//Proceedings of Computer Security Applications Conference. IS. 1. ] : IEEE, 2008..335 - 344.
  • 2Klein A. DOM based cross site scripting or XSS of the third kind[-JT. Web Application Security Consortium, 2005,4:59 - 64.
  • 3Jovanovic N, Kruegel C, Kirda E. Pixy.. a static analysis tool for detecting Web application vulnerabilities [J-]. IEEE, 2006,126..258-263.
  • 4Artzi S, Kiezun A, Dolby J, et al. Finding bugs in dynamic web applications E C ff Proceedings of the 2008 International Symposium on Software Testing and Analysis. [-S. 1. 1: ACM, 2008:261 -272.
  • 5Vogt P, Nentwich F, Jovanovic N, et al. Cross site scripting prevention with dynamic data tainting and static analysis[C]//Proceedings of the Network and Dis- tributed System Security Symposium (NDSS). New York, USA..[s. n. ], 2007..95 - 102.
  • 6Tang Zhushou, Zhu Haojin, Cao Zhenfu, et al. LWMxD: lexical based webmail XSS discoverer[,C] ff Proceedings of the First International Workshop on Security in Computers, Networking and Commu- nications. [-S. 1. ] : IEEE, 2008:976 - 981.
  • 7Ismail O, Etoh M, Kadobayashi Y. A proposal and implementation of automatic detection/collection system for cross-site scripting vulnerability [-C3 // Proceedings of the 18th International Conference on Advanced Information Networking and Applications. Washington, D.C. , USA: IEEE. 2004,129 - 136.
  • 8陈嘉迅.论跨站脚本(XSS)攻击的危害、成因及防范[J].网络与信息,2008(9):80-80. 被引量:6
  • 9褚诚云.跨站脚本XSS安全漏洞[J].程序员,2008(11):97-99. 被引量:4
  • 10黄玮,崔宝江,胡正名.Web应用程序客户端恶意代码技术研究与进展[J].电信科学,2009,25(2):72-79. 被引量:9

共引文献69

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部