English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113656/144643 (79%)
Visitors : 51729171      Online Users : 468
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 資訊學院 > 資訊科學系 > 學位論文 >  Item 140.119/60241
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/60241


    Title: Java網頁程式安全弱點驗證之測試案例產生工具
    Test Case Generation for Verifying Security Vulnerabilities in Java Web Applications
    Authors: 黃于育
    Huang, Yu Yu
    Contributors: 陳恭
    Chen, Kung
    黃于育
    Huang, Yu Yu
    Keywords: 測試案例產生
    符號化執行
    網頁應用程式
    靜態分析
    動態分析
    汙染資料流分析
    Test case generation
    Symbolic execution
    Web application
    Static analysis
    Dynamic analysis
    Taint analysis
    Date: 2010
    Issue Date: 2013-09-04 17:06:20 (UTC+8)
    Abstract: 近年來隨著網路的發達,網頁應用程式也跟著快速且普遍化地發展。網頁應用程式快速盛行卻忽略程式設計時的安全性考量,進而成為網路駭客的攻擊目標。因此,網頁應用程式的安全議題日益重要。目前已有許多網頁應用程式安全弱點的相關研究,以程式分析的技術找出弱點,主要分成靜態分析與動態分析兩大類。但無論是使用靜態或是動態的分析方法,仍有其不完美的地方。其中靜態分析結果完備但會產生過多弱點誤報;動態分析結果準確率高但會因為測試案例的不完備而造成弱點的漏報。因此,本論文研究結合了動靜態分析,利用靜態分析方法發展一套測試案例產生工具;再結合動態分析方法隨著測試案例的執行來追蹤測試資料並作弱點的驗證,以達到沒有弱點漏報的產生以及改善弱點誤報的目標。
    本論文研究的重點集中在以靜態分析技術產生涵蓋目標程式中所有可執行路徑的測試案例。我們應用測試案例產生常見的符號化執行技巧,利用程式的路徑限制蒐集與解決來達成測試案例產生。實作上我們利用跨程序性路徑分析找出目標程式中所有潛在弱點的路徑,再以反向路徑限制蒐集將限制資訊完整蒐集;最後交給限制分析器解限制並產生測試案例。接著利用剖面導向程式語言AspectJ的程式插碼技術實現動態的汙染資料流分析,配合產生的測試案執行程式觸發動態的汙染資料流分析並產生可信賴的弱點分析結果。
    Due to the rapid development of the internet in recent years, web applications have become very popular and ubiquitous. However, developers may neglect the issues of security while designing a program so that web applications become the targets of attackers. Hence, the issue of web application vulnerabilities has become very crucial. There have been many research results of web application security vulnerabilities and many of them exploit the technique of program analysis to detect vulnerabilities. These analysis approaches can be can basically be categorized into dynamic analysis and static analysis. However, both of them still have their own problems to be improved. Specifically static analysis supports high coverage of vulnerabilities, but causes too many false positives. As for the dynamic analysis, although it produces high confident results, yet it may cause false negatives without complete test cases.
    In this thesis, we integrate both static analysis and dynamic analysis to achieve the objectives that no false negatives are produced and reduce false positives. We develop a test case generation tool by the static analysis approach and a program execution tool that dynamically track the execution of the target program with those test data to detect its vulnerabilities. Our test case generation tool first employs both intra- and inter-procedural analysis to cover all vulnerable paths in a program, and then apply the symbolic execution technique to collect all path constraints. With these collected constraints, we use a constraint solver to solve them and finally generate the test cases. As to the execution tool, it utilizes the instrumentation mechanism provided by the aspect-oriented programming language AspectJ to implement a dynamic taint analysis that tracks the flow of tainted data derived from those generated test cases. As a result, all vulnerable program paths will be detected by our tools.
    Reference: [1]Artzi, S., Kiezun, A., Dolby, J., Tip, F., Dig, D., Paradkar, A., Ernst, M. D. “Finding bugs in dynamic Web applications.” In Proc. 2008 international symposium on Software testing and analysis(ISSTA), July 20-24, 2008, Seattle, WA, USA.
    [2]Chiang, C. L. “A Hybrid Security Analyzer for Java Web Application.” Master’s thesis, In Department of Computer Science, National Chengchi University, 2010.
    [3]Fu, X., Qian, K. “SAFELI: SQL injection scanner using symbolic execution.”
    In Proc. 2008 workshop on testing, analysis, and verification of web services and applications (TAV-WEB 2008), pages 34-39, 2008.
    [4]Haldar, V., Chandra, D., Franz, M. “Dynamic Taint Propagation for Java.” In 21st Annual Computer Security Applications Conference (ACSAC), pages 303–311, December 2005.
    [5]Huang, Y. W., Tsai, C. H., Lin, T. P., Huang, S. K., Lee, D. T., Kuo, S. Y. “A testing framework for Web application security assessment.” Computer Networks: The International Journal of Computer and Telecommunications Networking, pages 739-761, August 2005
    [6]Huang, Y. W., Yu, F., Hang , C., Tsai, C. H., Lee, D. T., Kuo, S. Y. “Securing Web Application Code by Static Analysis and Runtime Protection.” In Proc. 13th International World Wide Web Conference (WWW2004), May 2004.
    [7]Kiezun, A., Guo, P. J., Jayaraman, K., Ernst, M. D. “Automatic creation of SQL injection and cross-site scripting attacks.” In Proc. 2009 IEEE 31st International Conference on Software Engineering(ICSE), pages 199-209, IEEE Computer Science, 2009.
    [8]Lin, J. C., Chen, J. M. “An Automated Mechanism for Secure Input Handling.” Journal of Computers, v.4 n.9, September 2009.
    [9]Lokuciejewski P., Cordes, D., Falk, H., Marwedel, P. “A Fast and Precise Static Loop Analysis Based on Abstract Interpretation, Program Slicing and Polytope Models.” In Proc. 2009 International Symposium on Code Generation and Optimization, pages 136-146, March 22-25, 2009.
    [10]Masuhara, H., Kawauchi, K. “Dataflow Pointcut in Aspect-Oriented Programming.” In APLAS`03 - the First Asian Symposium on Programming Languages and Systems, pages 105-121, 2003.
    [11]Muchnick, S.S. Advanced Compiler Design and Implementation, 1997.
    [12]Nguyen-Tuong, A., Guarnieri, S., Greene, D., Evans, D. “Automatically Hardening Web Applications Using Precise Tainting.” In Proc. 20th IFIP International Information Security Conference, 2005.
    [13]OWASP Top 10 – 2010 the ten most critical Web application security risks, https://www.owasp.org/index.php/Top_10_2010-Main.
    [14]Saxena, P., Akhawe, D., Hanna, S., Mao, F., McCamant, S., Song, D. “A symbolic execution framework for javascript.” Technical Report UCB/EECS-2010-26, EECS Department, University of California, Berkeley, 2010.
    [15]Saxena, P., Poosankam, P., McCamant, S., Song, D.” Loop-extended symbolic execution on binary programs.” In Proc. ISSTA, 2009, pp.225-236.
    [16]Soot, A Java Optimization Framework, http://www.sable.mcgill.ca/soot/.
    [17]Standford SecuriBench Micro, 2006, http://suif.stanford.edu/~livshits/work/securibench-micro/.
    [18]Xu, W., Bhatkar, S., Sekar, R. “Practical Dynamic Taint Analysis for
    Countering Input Validation Attacks on Web Applications.” Technical Report SECLAB-05-04, Department of Computer Science, Stony Brook University, May 2005.
    [19]Yu, S. F. “Automatic Generation of Penetration Test Cases for Web Applications.” Master’s thesis, In Department of Information Management, National Taiwan University, 2010.
    Description: 碩士
    國立政治大學
    資訊科學學系
    97753022
    99
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0097753022
    Data Type: thesis
    Appears in Collections:[資訊科學系] 學位論文

    Files in This Item:

    File SizeFormat
    302201.pdf1265KbAdobe PDF21704View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback