A new approach for static detection of security vulnerabilities in web applications

Authors

1 Senior Expert in Information Technology Engineering, Faculty of Electrical and Computer Engineering, Yazd University

2 Assistant Professor, Faculty of Electrical and Computer Engineering, Yazd University

Abstract

Nowadays, due to the increased use of web-based applications and storage and exchange of sensitive
inforamtion by this category of programs, it is necessary to detect security vulnerabilities and remove them
to keep them secure against the misuse of intrusions. In most cases, the Static Analysis is especially valuable
in security assurance and detection of security vulnerabilities, while dynamic analysis goal is finding
and debugging the errors. In this paper, we present a new approach that detects common vulnerabilities in
web applications by Probable Data Flow Analysis on Vulnerability Probability Graph. VPG is designed to
consider the points with more probable to vulnerability and PDF Analysis is designed for the increase of
accuracy in vulnerability detection. The proposed approach was tested on a few web applications and the
results were compared with a few other tools that we observed improvement in performance in some cases.

Keywords


[1] L. D. P. Nico, “Authomated Security Review of
PHP Web Applications with Source Code Analysis,”
Thesis, University of Groningen, pp. 14-14,
2010.
[2] C. Korscheck, “Automatic Detection of Second-
Order Cross-Site Scripting Vulnerabilities,” Thesis,
University of Tubingen, pp. 2-4, 2010.
[3] J. Nenad, K. Christopher, and K. Engin, “Static
analysis for detecting taint-style vulnerabilities in
web applications,” Journal of Computer Security,
vol. 18, no. 5, 2010.
[4] L. Benjamin and S. L. Monica, “Finding Security
Vulnerabilities in Java Applications with Static
Analysis,” in USENIX Security Symposium, vol.
14, pp. 18-18, 2005.
[5] N. Anh, G. Salvatore, G. Doug, Sh. Jeff, and E.
David, “Authomatically hardening web applications
using precise tainting,” Security and Privacy
in the Age of Ubiquitous Computing, Springer
US, pp. 295-307, 2005.
[6] H. Vivek, Ch. Deepak, and F. Michael, “Dynamic
taint propagation for java,” in Annual Computer
Security Applications Conference, vol. 21, pp. 303
-311, 2005.
[7] K. Adam, J. G. Philip, J. Karthick, and D. E. Michael,
“Authomatic Creation of SQL Injection and
Cross-Site Scripting Attacks,” in International
Conference on Software Engineering, vol. 31, pp.
199-209, 2009.
[8] G. H. William, O. Alessandro, “AMNESIA: Analysis
and Monitoring for NEutralizing SQLInjection
Attacks,” in IEEE/ACM International
Conference on Authomated Software Engineering,
vol. 20, pp. 174-183, 2005.
[9] “RIPS-A static source code analyser for vulnerabilities
in PHP scripts,” http://ripsscanner.
sourceforge.net/ 2011.
[10] “phc – the open source PHP compiler,” [Online],
Version 3.0.1, http://www.phpcompiler.org/July
2013.
[11] “OWASP Top Ten Project,” [Online],
https://www.owasp.org/index.php/
Category:OWASP_Top_Ten_Project/June 2013.
[12] M. Ghorbanzadeh and M. R. Shahriari, “Static
detection of web applications vulnerabilities using
inverse data flow analysis for covering mejority of
sensitive points to vulnerability,” In international
ISC conferenec 9, Tehran, 1391. (In persian)
Volume 2, Issue 4 - Serial Number 4
September 2020
Pages 65-74
  • Receive Date: 05 August 2014
  • Revise Date: 04 July 2023
  • Accept Date: 19 September 2018
  • Publish Date: 21 January 2015