DocumentCode :
555290
Title :
Patching vulnerabilities with sanitization synthesis
Author :
Yu, Fang ; Alkhalaf, Muath ; Bultan, Tevfik
Author_Institution :
Nat. Chengchi Univ., Taipei, Taiwan
fYear :
2011
fDate :
21-28 May 2011
Firstpage :
251
Lastpage :
260
Abstract :
We present automata-based static string analysis techniques that automatically generate sanitization statements for patching vulnerable web applications. Our approach consists of three phases: Given an attack pattern we first conduct a vulnerability analysis to identify if strings that match the attack pattern can reach the security-sensitive functions. Next, we compute vulnerability signatures that characterize all input strings that can exploit the discovered vulnerability. Given the vulnerability signatures, we then construct sanitization statements that 1) check if a given input matches the vulnerability signature and 2) modify the input in a minimal way so that the modified input does not match the vulnerability signature. Our approach is capable of generating relational vulnerability signatures (and corresponding sanitization statements) for vulnerabilities that are due to more than one input.
Keywords :
Internet; automata theory; program diagnostics; security of data; automata-based static string analysis techniques; automatic sanitization statement generation; security-sensitive functions; vulnerability signatures; vulnerable Web application patching; Approximation methods; Automata; Doped fiber amplifiers; Impedance matching; Input variables; Reachability analysis; Security; automata; sanitization synthesis; string analysis;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Software Engineering (ICSE), 2011 33rd International Conference on
Conference_Location :
Honolulu, HI
ISSN :
0270-5257
Print_ISBN :
978-1-4503-0445-0
Electronic_ISBN :
0270-5257
Type :
conf
DOI :
10.1145/1985793.1985828
Filename :
6032464
Link To Document :
بازگشت