DocumentCode
3578868
Title
Input injection detection in Java code
Author
Pasaribu, Edward Samuel ; Asnar, Yudistira ; Inggriani Liem, M.M.
Author_Institution
Data & Software Eng. Res. Group, Inst. Teknol. Bandung, Bandung, Indonesia
fYear
2014
Firstpage
1
Lastpage
6
Abstract
Input Injections are considered as the most common and effective vulnerabilities to exploit in many software systems (esp. web apps). In this paper, we propose a way to detect such vulnerabilities, such as SQL injection, command injection, and cross-site scripting. Input injection is caused by executing user inputs which have not been validated or sanitized, so that the purpose of execution is changed by malicious agents into their advantages. The input injection detector is done by extending an existing static analysis tool, namely FindBugs. The detection uses a dataflow analysis to monitor user-contaminated variables. To improve accuracy, reducing false positives and false negatives, dataflow analysis is used to monitor variables that have been validated or sanitized by developers. Our detector has only few false positives and false negatives based on our testing using our test cases and existing applications, i.e. WebGoat and ADempiere.
Keywords
Java; data flow analysis; program debugging; program testing; software agents; FindBugs; Java code; dataflow analysis; input injection detection; malicious agents; software systems; static analysis tool; testing; user-contaminated variable monitoring; Computer bugs; Databases; Detectors; Java; Monitoring; Software; Testing; FindBugs; dataflow analysis; detection; input injection; static analysis;
fLanguage
English
Publisher
ieee
Conference_Titel
Data and Software Engineering (ICODSE), 2014 International Conference on
Print_ISBN
978-1-4799-8175-5
Type
conf
DOI
10.1109/ICODSE.2014.7062698
Filename
7062698
Link To Document