z-logo
open-access-imgOpen Access
Search-based security testing of web applications
Author(s) -
Julian Thomé,
Alessandra Gorla,
Andreas Zeller
Publication year - 2014
Publication title -
open repository and bibliography (university of luxembourg)
Language(s) - English
Resource type - Conference proceedings
DOI - 10.1145/2593833.2593835
Subject(s) - computer science , sql injection , web application , vulnerability (computing) , web application security , sql , code (set theory) , database , web server , interface (matter) , black box , world wide web , web page , operating system , the internet , web development , computer security , programming language , query by example , web search query , search engine , artificial intelligence , set (abstract data type) , bubble , maximum bubble pressure method
SQL injections are still the most exploited web application vulnerabilities. We present a technique to automatically detect such vulnerabilities through targeted test generation. Our approach uses search-based testing to systematically evolve inputs to maximize their potential to expose vulnerabilities. Starting from an entry URL, our BIOFUZZ prototype systematically crawls a web application and generates inputs whose effects on the SQL interaction are assessed at the interface between Web server and database. By evolving those inputs whose resulting SQL interactions show best potential, BIOFUZZ exposes vulnerabilities on real-world Web applications within minutes. As a black-box approach, BIOFUZZ requires neither analysis nor instrumentation of server code; however, it even outperforms state-of-the-art white-box vulnerability scanners.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom