Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. Web applications are ubiquitous, perform mission- critical tasks, and handle sensitive user data. Unfortunately, web applications are often implemented by developers with limited security skills, and, as a result, they contain vulnerabilities. Most of these vulnerabilities stem from the lack of input validation. That is, web applications use malicious input as part of a sensitive operation, without having properly checked or sanitized the input values prior to their use. Past research on vulnerability analysis has mostly focused on identifying cases in which a web application directly uses external input in critical operations. However, little research has been performed to analyze the correctness of the sanitization process. Thus, whenever a web application applies some sanitization routine to potentially malicious input, the vulnerability analysis assumes that the result is innocuous. Unfortunately, this might not be the case, as the sanitization process itself could be incorrect or incomplete. In this paper, we present a novel approach to the analysis of the sanitization process. More precisely, we combine static and dynamic analysis techniques to identify faulty sanitization procedures that can be bypassed by an attacker. We implemented our approach in a tool, called Saner, and we applied it to a number of real-world applications. Our results demonstrate that we were able to identify several novel vulnerabilities that stem from erroneous sanitization procedures.
Keywords for this software
References in zbMATH (referenced in 9 articles )
Showing results 1 to 9 of 9.
- Prokhorenko, Victor; Choo, Kim-Kwang Raymond; Ashman, Helen: Context-oriented web application protection model (2016)
- Veanes, Margus; Bjørner, Nikolaj: Equivalence of finite-valued symbolic finite transducers (2016)
- Veanes, Margus: Symbolic string transformations with regular lookahead and rollback (2015)
- Li, Xiaowei; Xue, Yuan.: A survey on server-side approaches to securing web applications (2014)
- Razzaq, Abdul; Latif, Khalid; Ahmad, H. Farooq; Hur, Ali; Anwar, Zahid; Bloodsworth, Peter Charles: Semantic security against web application attacks (2014) ioport
- Yu, Fang; Alkhalaf, Muath; Bultan, Tevfik; Ibarra, Oscar H.: Automata-based symbolic string analysis for vulnerability detection (2014)
- Zhang, Ruoyu; Huang, Shiqiu; Qi, Zhengwei; Guan, Haibing: Static program analysis assisted dynamic taint tracking for software vulnerability discovery (2012) ioport
- Gorla, Daniele; Pugliese, Rosario: Dynamic management of capabilities in a network aware coordination language (2009)
- Yu, Fang; Bultan, Tevfik; Ibarra, Oscar H.: Symbolic string verification: Combining string analysis and size analysis (2009)