Static Detection of User-specified Security Vulnerabilities in Client-side Java']JavaScript

被引:4
|
作者
Nicolay, Jens [1 ]
Spruyt, Valentijn [1 ]
De Roover, Coen [1 ]
机构
[1] Vrije Univ Brussel, Software Languages Lab, Brussels, Belgium
关键词
QUERIES;
D O I
10.1145/2993600.2993612
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Program defects tend to surface late in the development of programs, and they are hard to detect. Security vulnerabilities are particularly important defects to detect. They may cause sensitive information to be leaked or the system on which the program is executed to be compromised. Existing approaches that use static analysis to detect security vulnerabilities in source code are often limited to a predetermined set of encoded security vulnerabilities. Although these approaches support a decent number of vulnerabilities by default, they cannot be configured for detecting vulnerabilities that are specific to the application domain of the analyzed program. In this paper we present JS-QL, a framework for detecting user-specified security vulnerabilities in JavaScript applications statically. The framework makes use of an internal domain-specific query language hosted by JavaScript. JSQL queries are based on regular path expressions, enabling users to express queries over a flow graph in a declarative way. The flow graph represents the run-time behavior of a program and is computed by a static analysis. We evaluate JS-QL by expressing 9 security vulnerabilities supported by existing work and comparing the resulting specifications. We conclude that the combination of static analysis and regular path expressions lends itself well to the detection of user-specified security vulnerabilities.
引用
收藏
页码:3 / 13
页数:11
相关论文
共 50 条
  • [21] The Security Lottery: Measuring Client-Side Web Security Inconsistencies
    Roth, Sebastian
    Calzavara, Stefano
    Wilhelm, Moritz
    Rabitti, Alvise
    Stock, Ben
    [J]. PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 2047 - 2064
  • [22] Extracting Client-Side Web User Interface Controls
    Maras, Josip
    Stula, Maja
    Carlson, Jan
    [J]. WEB ENGINEERING, 2010, 6189 : 502 - +
  • [23] A client-side detection mechanism for evil twins
    Hsu, Fu-Hau
    Wang, Chuan-Sheng
    Hsu, Yu-Liang
    Cheng, Yung-Pin
    Hsneh, Yu-Hsiang
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2017, 59 : 76 - 85
  • [24] Client-Side Detection of SQL Injection Attack
    Shahriar, Hossain
    North, Sarah
    Chen, Wei-Chuen
    [J]. ADVANCED INFORMATION SYSTEMS ENGINEERING WORKSHOPS (CAISE), 2013, 148 : 512 - 517
  • [25] Finding security vulnerabilities in Java']Java applications with static analysis
    Livshits, VB
    Lam, MS
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE 14TH USENIX SECURITY SYMPOSIUM, 2005, : 271 - 286
  • [26] Reusable Client-Side Java']JavaScript Modules for Immersive Web-Based Real-Time Collaborative Neuroimage Visualization
    Bernal-Rusiel, Jorge L.
    Rannou, Nicolas
    Gollub, Randy L.
    Pieper, Steve
    Murphy, Shawn
    Robertson, Richard
    Grant, Patricia E.
    Pienaar, Rudolph
    [J]. FRONTIERS IN NEUROINFORMATICS, 2017, 11
  • [27] LAPSE plus Static Analysis Security Software: Vulnerabilities Detection in Java']Java EE Applications
    Martin Perez, Pablo
    Filipiak, Joanna
    Maria Sierra, Jose
    [J]. FUTURE INFORMATION TECHNOLOGY, PT 1, 2011, 184 : 148 - 156
  • [28] Enhancing User Privacy in Adaptive Web Sites with Client-Side User Profiles
    Kolias, C.
    Kolias, V.
    Anagnostopoulos, I.
    Kambourakis, G.
    Kayafas, E.
    [J]. THIRD INTERNATIONAL WORKSHOP ON SEMANTIC MEDIA ADAPTATION AND PERSONALIZATION, PROCEEDINGS, 2008, : 170 - +
  • [29] Parallel Network Data Processing in Client Side Java']JavaScript Applications
    Wenzel, Matthias
    Meinel, Christoph
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COLLABORATION TECHNOLOGIES AND SYSTEMS, 2015, : 140 - 147
  • [30] ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities
    Weissbacher, Michael
    Robertson, William
    Kirda, Engin
    Kruegel, Christopher
    Vigna, Giovanni
    [J]. PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, 2015, : 737 - 752