“Automatic Detection and Correction of Web Application Vulnerabilities using Data Mining to Predict False Positives”
From Navigators
(Difference between revisions)
Line 9: | Line 9: | ||
|year=2014 | |year=2014 | ||
|abstract=Web application security is an important problem in today's internet. A major cause of this status is that many programmers do not have adequate knowledge about secure coding, so they leave applications with vulnerabilities. An approach to | |abstract=Web application security is an important problem in today's internet. A major cause of this status is that many programmers do not have adequate knowledge about secure coding, so they leave applications with vulnerabilities. An approach to | ||
- | solve this problem is to use source code static analysis to | + | solve this problem is to use source code static analysis to solve these bugs, but these tools are known to report many false positives that make hard the task of correcting the application. This paper explores the use of a hybrid of methods to |
- | detect vulnerabilities with less false positives. After an initial step that uses taint analysis to flag candidate vulnerabilities, our approach uses data mining to predict the existence of false positives. This approach reaches a trade- | + | detect vulnerabilities with less false positives. After an initial step that uses taint analysis to flag candidate vulnerabilities, our approach uses data mining to predict the existence of false positives. This approach reaches a trade-off between two apparently opposite approaches: humans coding the knowledge about vulnerabilities (for taint analysis) versus automatically obtaining that knowledge (with machine learning, for data mining). Given this more precise form of detection, we do automatic code correction by inserting fixes in the source code. |
The approach was implemented in the WAP tool and an experimental evaluation was performed with a large set of open source PHP applications. | The approach was implemented in the WAP tool and an experimental evaluation was performed with a large set of open source PHP applications. | ||
|address=Seoul, Korea | |address=Seoul, Korea | ||
|booktitle=International World Wide Web Conference (WWW) | |booktitle=International World Wide Web Conference (WWW) | ||
}} | }} |
Revision as of 14:29, 23 July 2014
Ibéria Medeiros, Nuno Neves, Miguel Correia
in International World Wide Web Conference (WWW), Seoul, Korea, Apr. 2014.
Abstract: Web application security is an important problem in today's internet. A major cause of this status is that many programmers do not have adequate knowledge about secure coding, so they leave applications with vulnerabilities. An approach to solve this problem is to use source code static analysis to solve these bugs, but these tools are known to report many false positives that make hard the task of correcting the application. This paper explores the use of a hybrid of methods to detect vulnerabilities with less false positives. After an initial step that uses taint analysis to flag candidate vulnerabilities, our approach uses data mining to predict the existence of false positives. This approach reaches a trade-off between two apparently opposite approaches: humans coding the knowledge about vulnerabilities (for taint analysis) versus automatically obtaining that knowledge (with machine learning, for data mining). Given this more precise form of detection, we do automatic code correction by inserting fixes in the source code. The approach was implemented in the WAP tool and an experimental evaluation was performed with a large set of open source PHP applications.
Download paper
Export citation
Project(s): Project:SEGRID
Research line(s): Fault and Intrusion Tolerance in Open Distributed Systems (FIT)