A Search-Based Testing Approach for XML Injection Vulnerabilities in Web Applications

Sadeeq Jan, Cu D. Nguyen, Andrea Arcuri, Lionel Briand

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In most cases, web applications communicate with web services (SOAP and RESTful). The former act as a front-end to the latter, which contain the business logic. A hacker might not have direct access to those web services (e.g., they are not on public networks), but can still provide malicious inputs to the web application, thus potentially compromising related services. Typical examples are XML injection attacks that target SOAP communications. In this paper, we present a novel, search-based approach used to generate test data for a web application in an attempt to deliver malicious XML messages to web services. Our goal is thus to detect XML injection vulnerabilities in web applications. The proposed approach is evaluated on two studies, including an industrial web application with millions of users. Results show that we are able to effectively generate test data (e.g., input values in an HTML form) that detect such vulnerabilities.

Original languageEnglish
Title of host publicationProceedings - 10th IEEE International Conference on Software Testing, Verification and Validation, ICST 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages356-366
Number of pages11
ISBN (Electronic)9781509060313
DOIs
Publication statusPublished - 15 May 2017
Externally publishedYes
Event10th IEEE International Conference on Software Testing, Verification and Validation, ICST 2017 - Tokyo, Japan
Duration: 13 Mar 201717 Mar 2017

Publication series

NameProceedings - 10th IEEE International Conference on Software Testing, Verification and Validation, ICST 2017

Conference

Conference10th IEEE International Conference on Software Testing, Verification and Validation, ICST 2017
Country/TerritoryJapan
CityTokyo
Period13/03/1717/03/17

Keywords

  • Sbst
  • Security testing
  • Xml injection

Fingerprint

Dive into the research topics of 'A Search-Based Testing Approach for XML Injection Vulnerabilities in Web Applications'. Together they form a unique fingerprint.

Cite this