DocumentCode
555290
Title
Patching vulnerabilities with sanitization synthesis
Author
Yu, Fang ; Alkhalaf, Muath ; Bultan, Tevfik
Author_Institution
Nat. Chengchi Univ., Taipei, Taiwan
fYear
2011
fDate
21-28 May 2011
Firstpage
251
Lastpage
260
Abstract
We present automata-based static string analysis techniques that automatically generate sanitization statements for patching vulnerable web applications. Our approach consists of three phases: Given an attack pattern we first conduct a vulnerability analysis to identify if strings that match the attack pattern can reach the security-sensitive functions. Next, we compute vulnerability signatures that characterize all input strings that can exploit the discovered vulnerability. Given the vulnerability signatures, we then construct sanitization statements that 1) check if a given input matches the vulnerability signature and 2) modify the input in a minimal way so that the modified input does not match the vulnerability signature. Our approach is capable of generating relational vulnerability signatures (and corresponding sanitization statements) for vulnerabilities that are due to more than one input.
Keywords
Internet; automata theory; program diagnostics; security of data; automata-based static string analysis techniques; automatic sanitization statement generation; security-sensitive functions; vulnerability signatures; vulnerable Web application patching; Approximation methods; Automata; Doped fiber amplifiers; Impedance matching; Input variables; Reachability analysis; Security; automata; sanitization synthesis; string analysis;
fLanguage
English
Publisher
ieee
Conference_Titel
Software Engineering (ICSE), 2011 33rd International Conference on
Conference_Location
Honolulu, HI
ISSN
0270-5257
Print_ISBN
978-1-4503-0445-0
Electronic_ISBN
0270-5257
Type
conf
DOI
10.1145/1985793.1985828
Filename
6032464
Link To Document