Türpe, Sven ; Poller, Andreas ; Trukenmüller, Jan ; Repp, Jürgen ; Bornmann, Christian (2008)
Supporting Security Testers in Discovering Injection Flaws.
doi: 10.1109/TAIC-PART.2008.7
Conference or Workshop Item, Bibliographie
Abstract
We present a platform for software security testing primarily designed to support human testers in discovering injection flaws in distributed systems. Injection is an important class of security faults, caused by unsafe concatenation of input into strings interpreted by other components of the system. Examples include two of the most common security issues in Web applications, SQL injection and cross site scripting. This paper briefly discusses the fault model, derives a testing strategy that should discover a large subset of the injection flaws present, and describes a platform that helps security testers to discover injection flaws through dynamic grey-box testing. Our platform combines the respective strengths of machines and humans, automating what is easily automated while leaving to the tester the artistic portion of security testing. Although designed with a specific fault model in mind, our platform may be useful in a wide range of security testing tasks.
Item Type: | Conference or Workshop Item |
---|---|
Erschienen: | 2008 |
Creators: | Türpe, Sven ; Poller, Andreas ; Trukenmüller, Jan ; Repp, Jürgen ; Bornmann, Christian |
Type of entry: | Bibliographie |
Title: | Supporting Security Testers in Discovering Injection Flaws |
Language: | English |
Date: | August 2008 |
Book Title: | Proc. TAIC-PART 2008 |
DOI: | 10.1109/TAIC-PART.2008.7 |
Abstract: | We present a platform for software security testing primarily designed to support human testers in discovering injection flaws in distributed systems. Injection is an important class of security faults, caused by unsafe concatenation of input into strings interpreted by other components of the system. Examples include two of the most common security issues in Web applications, SQL injection and cross site scripting. This paper briefly discusses the fault model, derives a testing strategy that should discover a large subset of the injection flaws present, and describes a platform that helps security testers to discover injection flaws through dynamic grey-box testing. Our platform combines the respective strengths of machines and humans, automating what is easily automated while leaving to the tester the artistic portion of security testing. Although designed with a specific fault model in mind, our platform may be useful in a wide range of security testing tasks. |
Uncontrolled Keywords: | Secure Services; security testing; tool; vulnerability; SQL injection; cross site scripting; Softwaretest |
Identification Number: | TUD-CS-2008-1122 |
Divisions: | LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt LOEWE > LOEWE-Zentren LOEWE |
Date Deposited: | 30 Dec 2016 20:23 |
Last Modified: | 17 May 2018 13:02 |
PPN: | |
Export: | |
Suche nach Titel in: | TUfind oder in Google |
Send an inquiry |
Options (only for editors)
Show editorial Details |