• DocumentCode
    3578868
  • Title

    Input injection detection in Java code

  • Author

    Pasaribu, Edward Samuel ; Asnar, Yudistira ; Inggriani Liem, M.M.

  • Author_Institution
    Data & Software Eng. Res. Group, Inst. Teknol. Bandung, Bandung, Indonesia
  • fYear
    2014
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    Input Injections are considered as the most common and effective vulnerabilities to exploit in many software systems (esp. web apps). In this paper, we propose a way to detect such vulnerabilities, such as SQL injection, command injection, and cross-site scripting. Input injection is caused by executing user inputs which have not been validated or sanitized, so that the purpose of execution is changed by malicious agents into their advantages. The input injection detector is done by extending an existing static analysis tool, namely FindBugs. The detection uses a dataflow analysis to monitor user-contaminated variables. To improve accuracy, reducing false positives and false negatives, dataflow analysis is used to monitor variables that have been validated or sanitized by developers. Our detector has only few false positives and false negatives based on our testing using our test cases and existing applications, i.e. WebGoat and ADempiere.
  • Keywords
    Java; data flow analysis; program debugging; program testing; software agents; FindBugs; Java code; dataflow analysis; input injection detection; malicious agents; software systems; static analysis tool; testing; user-contaminated variable monitoring; Computer bugs; Databases; Detectors; Java; Monitoring; Software; Testing; FindBugs; dataflow analysis; detection; input injection; static analysis;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Data and Software Engineering (ICODSE), 2014 International Conference on
  • Print_ISBN
    978-1-4799-8175-5
  • Type

    conf

  • DOI
    10.1109/ICODSE.2014.7062698
  • Filename
    7062698