[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/2337223.2337399acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
Article

Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities

Published: 02 June 2012 Publication History

Abstract

Static code attributes such as lines of code and cyclomatic complexity have been shown to be useful indicators of defects in software modules. As web applications adopt input sanitization routines to prevent web security risks, static code attributes that represent the characteristics of these routines may be useful for predicting web application vulnerabilities. In this paper, we classify various input sanitization methods into different types and propose a set of static code attributes that represent these types. Then we use data mining methods to predict SQL injection and cross site scripting vulnerabilities in web applications. Preliminary experiments show that our proposed attributes are important indicators of such vulnerabilities.

References

[1]
N. F. Schneidewind, "Methodology for validating software metrics," IEEE Trans. Softw. Eng., vol. 18(5), 1992, pp. 410-422.
[2]
T. McCabe, "A complexity measure," IEEE Trans. Softw. Eng., vol. 2(4), 1976, pp. 308-320.
[3]
T. Menzies, J. Greenwald, and A. Frank, "Data mining static code attributes to learn defect predictors," IEEE Trans. Softw. Eng., vol. 33(1), 2007, pp. 2-13.
[4]
S. Lessmann, B. Baesens, C. Mues, and S. Pietsch, "Benchmarking classification models for software defect prediction: a proposed framework and novel findings," IEEE Trans. Softw. Eng., vol. 34(4), 2008, pp. 485-496.
[5]
T. Zimmermann and N. Nagappan, "Predicting defect using network analysis on dependency graphs," In ICSE'08, 2008, pp. 531-540.
[6]
N. Jovanovic, C. Kruegel, and E. Kirda, "Pixy: a static analysis tool for detecting web application vulnerabilities," In S&P'06, 2006, pp. 258-263.
[7]
Y. Xie and A. Aiken, "Static detection of security vulnerabilities in scripting languages," In USENIX Security'06, 2006, pp. 179-192.
[8]
G. Wassermann and Z. Su, "Static detection of cross-site scripting vulnerabilities," In ICSE'08, 2008, pp. 171-180.
[9]
A. Kiezun, P. J. Guo, K. Jayaraman, and M. D. Ernst, "Automatic creation of SQL injection and cross-site scripting attacks," In ICSE'09, 2009, pp. 199-209.
[10]
M. Martin and M. S. Lam, "Automatic generation of XSS and SQL injection attacks with goal-directed model checking," In USENIX Security'08, 2008, pp. 31-43.
[11]
OWASP Top 10, 2010, http://www.owasp.org/
[12]
I. H. Witten and E. Frank, Data Mining, 2nd ed., Morgan Kaufmann, Los Altos, CA, 2005.
[13]
T. Mende, "Replication of defect prediction studies: problems, pitfalls and recommendations," In PROMISE'10, 2010.
[14]
T. Menzies, Z. Milton, B. Turhan, B. Cukic, Y. Jiang, and A. Bener, "Defect prediction from static code features: current results, limitations, new approaches," Autom. Softw. Eng., vol. 17(4), 2010, pp. 375-407.

Cited By

View all
  • (2024)Machine Learning for Actionable Warning Identification: A Comprehensive SurveyACM Computing Surveys10.1145/369635257:2(1-35)Online publication date: 19-Sep-2024
  • (2019)Active learning for software engineeringProceedings of the 2019 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software10.1145/3359591.3359732(62-78)Online publication date: 23-Oct-2019
  • (2019)CNNPaylProceedings of the 2019 11th International Conference on Machine Learning and Computing10.1145/3318299.3318302(477-483)Online publication date: 22-Feb-2019
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ICSE '12: Proceedings of the 34th International Conference on Software Engineering
June 2012
1657 pages
ISBN:9781467310673

Sponsors

Publisher

IEEE Press

Publication History

Published: 02 June 2012

Check for updates

Qualifiers

  • Article

Conference

ICSE '12
Sponsor:

Acceptance Rates

Overall Acceptance Rate 276 of 1,856 submissions, 15%

Upcoming Conference

ICSE 2025

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Machine Learning for Actionable Warning Identification: A Comprehensive SurveyACM Computing Surveys10.1145/369635257:2(1-35)Online publication date: 19-Sep-2024
  • (2019)Active learning for software engineeringProceedings of the 2019 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software10.1145/3359591.3359732(62-78)Online publication date: 23-Oct-2019
  • (2019)CNNPaylProceedings of the 2019 11th International Conference on Machine Learning and Computing10.1145/3318299.3318302(477-483)Online publication date: 22-Feb-2019
  • (2017)Source Code Patterns of SQL Injection VulnerabilitiesProceedings of the 12th International Conference on Availability, Reliability and Security10.1145/3098954.3103173(1-7)Online publication date: 29-Aug-2017
  • (2016)DEKANT: a static analysis tool that learns to detect web application vulnerabilitiesProceedings of the 25th International Symposium on Software Testing and Analysis10.1145/2931037.2931041(1-11)Online publication date: 18-Jul-2016
  • (2014)Prediction of Cross-Site Scripting Attack Using Machine Learning AlgorithmsProceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing10.1145/2660859.2660969(1-5)Online publication date: 10-Oct-2014
  • (2014)Automatic detection and correction of web application vulnerabilities using data mining to predict false positivesProceedings of the 23rd international conference on World wide web10.1145/2566486.2568024(63-74)Online publication date: 7-Apr-2014
  • (2013)Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysisProceedings of the 2013 International Conference on Software Engineering10.5555/2486788.2486873(642-651)Online publication date: 18-May-2013
  • (2012)Predicting common web application vulnerabilities from input validation and sanitization code patternsProceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering10.1145/2351676.2351733(310-313)Online publication date: 3-Sep-2012

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media