DocumentCode :
635215
Title :
Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis
Author :
Lwin Khin Shar ; Hee Beng Kuan Tan ; Briand, Lionel C.
Author_Institution :
Sch. of Electr. & Electron. Eng., Nanyang Technol. Univ., Singapore, Singapore
fYear :
2013
fDate :
18-26 May 2013
Firstpage :
642
Lastpage :
651
Abstract :
In previous work, we proposed a set of static attributes that characterize input validation and input sanitization code patterns. We showed that some of the proposed static attributes are significant predictors of SQL injection and cross site scripting vulnerabilities. Static attributes have the advantage of reflecting general properties of a program. Yet, dynamic attributes collected from execution traces may reflect more specific code characteristics that are complementary to static attributes. Hence, to improve our initial work, in this paper, we propose the use of dynamic attributes to complement static attributes in vulnerability prediction. Furthermore, since existing work relies on supervised learning, it is dependent on the availability of training data labeled with known vulnerabilities. This paper presents prediction models that are based on both classification and clustering in order to predict vulnerabilities, working in the presence or absence of labeled training data, respectively. In our experiments across six applications, our new supervised vulnerability predictors based on hybrid (static and dynamic) attributes achieved, on average, 90% recall and 85% precision, that is a sharp increase in recall when compared to static analysis-based predictions. Though not nearly as accurate, our unsupervised predictors based on clustering achieved, on average, 76% recall and 39% precision, thus suggesting they can be useful in the absence of labeled training data.
Keywords :
SQL; data mining; data privacy; pattern classification; pattern clustering; program diagnostics; security of data; SQL injection mining; classification; clustering; cross site scripting vulnerabilities; dynamic attributes; hybrid attributes; hybrid program analysis; prediction models; privacy; security; static analysis-based predictions; static attributes; supervised vulnerability predictors; Data mining; Databases; HTML; Predictive models; Security; Supervised learning; Training data; Defect prediction; empirical study; input validation and sanitization; static and dynamic analysis; vulnerability;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Software Engineering (ICSE), 2013 35th International Conference on
Conference_Location :
San Francisco, CA
Print_ISBN :
978-1-4673-3073-2
Type :
conf
DOI :
10.1109/ICSE.2013.6606610
Filename :
6606610
Link To Document :
بازگشت