Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1009382.1009735guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Verifying Web Applications Using Bounded Model Checking

Published: 28 June 2004 Publication History

Abstract

The authors describe the use of bounded modelchecking (BMC) for verifying Web application code.Vulnerable sections of code are patched automaticallywith runtime guards, allowing both verification andassurance to occur without user intervention. Modelchecking techniques are relatively complex compared tothe typestate-based polynomial-time algorithm (TS) weadopted in an earlier paper, but they offer threebenefits-they provide counterexamples, more precisemodels, and sound and complete verification. Comparedto conventional model checking techniques, BMC offers amore practical approach to verifying programscontaining large numbers of variables, but requires fixedprogram diameters to be complete. Formalizing Webapplication vulnerabilities as a secure information flowproblem with fixed diameter allows for BMC applicationwithout drawback. Using BMC-producedcounterexamples, errors that result from propagations ofthe same initial error can be reported as a single grouprather than individually. This offers two distinct benefits.First, together with the counterexamples themselves, theyallow for more descriptive and precise error reports.Second, it allows for automated patching at locationswhere errors are initially introduced rather than atlocations where the propagated errors cause problems.Results from a TS-BMC comparison test using 230 open-sourceWeb applications showed a 41.0% decrease inruntime instrumentations when BMC was used. In the 38vulnerable projects identified by TS, BMC classified theTS-reported 980 individual errors into 578 groups, witheach group requiring a minimal set of patches for repair.

Cited By

View all
  • (2018)The role of model checking in software engineeringFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-016-6192-012:4(642-668)Online publication date: 1-Aug-2018
  • (2012)Program analysis scenarios in rascalProceedings of the 9th international conference on Rewriting Logic and Its Applications10.1007/978-3-642-34005-5_2(10-30)Online publication date: 24-Mar-2012
  • (2011)ASIDEProceedings of the 27th Annual Computer Security Applications Conference10.1145/2076732.2076770(267-276)Online publication date: 5-Dec-2011
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
DSN '04: Proceedings of the 2004 International Conference on Dependable Systems and Networks
June 2004
ISBN:0769520529

Publisher

IEEE Computer Society

United States

Publication History

Published: 28 June 2004

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 28 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2018)The role of model checking in software engineeringFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-016-6192-012:4(642-668)Online publication date: 1-Aug-2018
  • (2012)Program analysis scenarios in rascalProceedings of the 9th international conference on Rewriting Logic and Its Applications10.1007/978-3-642-34005-5_2(10-30)Online publication date: 24-Mar-2012
  • (2011)ASIDEProceedings of the 27th Annual Computer Security Applications Conference10.1145/2076732.2076770(267-276)Online publication date: 5-Dec-2011
  • (2011)Checking enforcement of integrity constraints in database applications based on code patternsJournal of Systems and Software10.1016/j.jss.2011.06.04484:12(2253-2264)Online publication date: 1-Dec-2011
  • (2010)Static analysis for detecting taint-style vulnerabilities in web applicationsJournal of Computer Security10.5555/1841962.184196818:5(861-907)Online publication date: 1-Sep-2010
  • (2008)Automatic generation of XSS and SQL injection attacks with goal-directed model checkingProceedings of the 17th conference on Security symposium10.5555/1496711.1496714(31-43)Online publication date: 28-Jul-2008
  • (2007)An automatic meta-revised mechanism for anti-malicious injectionProceedings of the 1st international conference on Network-based information systems10.5555/1776510.1776523(98-107)Online publication date: 3-Sep-2007
  • (2006)Precise alias analysis for static detection of web application vulnerabilitiesProceedings of the 2006 workshop on Programming languages and analysis for security10.1145/1134744.1134751(27-36)Online publication date: 10-Jun-2006
  • (2005)A testing framework for Web application security assessmentComputer Networks: The International Journal of Computer and Telecommunications Networking10.5555/1090583.164861148:5(739-761)Online publication date: 5-Aug-2005
  • (2004)Securing web application code by static analysis and runtime protectionProceedings of the 13th international conference on World Wide Web10.1145/988672.988679(40-52)Online publication date: 17-May-2004

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media