• DocumentCode
    2845486
  • Title

    Semi-Automatic Security Testing of Web Applications from a Secure Model

  • Author

    Büchler, Matthias ; Oudinet, Johan ; Pretschner, Alexander

  • Author_Institution
    Karlsruhe Inst. of Technol., Karlsruhe, Germany
  • fYear
    2012
  • fDate
    20-22 June 2012
  • Firstpage
    253
  • Lastpage
    262
  • Abstract
    Web applications are a major target of attackers. The increasing complexity of such applications and the subtlety of today´s attacks make it very hard for developers to manually secure their web applications. Penetration testing is considered an art, the success of a penetration tester in detecting vulnerabilities mainly depends on his skills. Recently, model-checkers dedicated to security analysis have proved their ability to identify complex attacks on web-based security protocols. However, bridging the gap between an abstract attack trace output by a model-checker and a penetration test on the real web application is still an open issue. We present here a methodology for testing web applications starting from a secure model. First, we mutate the model to introduce specific vulnerabilities present in web applications. Then, a model-checker outputs attack traces that exploit those vulnerabilities. Next, the attack traces are translated into concrete test cases by using a 2-step mapping. Finally, the tests are executed on the real system using an automatic procedure that may request the help of a test expert from time to time. A prototype has been implemented and evaluated on Web Goat, an insecure web application maintained by OWASP. It successfully reproduced Role-Based Access Control (RBAC) and Cross-Site Scripting (XSS) attacks.
  • Keywords
    Internet; authorisation; cryptographic protocols; formal verification; program testing; 2-step mapping; OWASP; RBAC; Web application testing; Web-based security protocols; WebGoat; abstract attack trace output; automatic procedure; cross-site scripting attacks; model-checkers; penetration testing; real system; role-based access control; secure model; security analysis; semiautomatic security testing; vulnerability detection; Abstracts; Authorization; Browsers; Protocols; Servers; Testing; WebGoat; bridging abstraction gaps; model-based fault injection; security testing; web application;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Software Security and Reliability (SERE), 2012 IEEE Sixth International Conference on
  • Conference_Location
    Gaithersburg, MD
  • Print_ISBN
    978-1-4673-2067-2
  • Type

    conf

  • DOI
    10.1109/SERE.2012.38
  • Filename
    6258315