TY - JOUR
T1 - Automatic Generation of Tests to Exploit XML Injection Vulnerabilities in Web Applications
AU - Jan, Sadeeq
AU - Panichella, Annibale
AU - Arcuri, Andrea
AU - Briand, Lionel
N1 - Publisher Copyright:
© 1976-2012 IEEE.
PY - 2019/4/1
Y1 - 2019/4/1
N2 - Modern enterprise systems can be composed of many web services (e.g., SOAP and RESTful). Users of such systems might not have direct access to those services, and rather interact with them through a single-entry point which provides a GUI (e.g., a web page or a mobile app). Although the interactions with such entry point might be secure, a hacker could trick such systems to send malicious inputs to those internal web services. A typical example is XML injection targeting SOAP communications. Previous work has shown that it is possible to automatically generate such kind of attacks using search-based techniques. In this paper, we improve upon previous results by providing more efficient techniques to generate such attacks. In particular, we investigate four different algorithms and two different fitness functions. A large empirical study, involving also two industrial systems, shows that our technique is effective at automatically generating XML injection attacks.
AB - Modern enterprise systems can be composed of many web services (e.g., SOAP and RESTful). Users of such systems might not have direct access to those services, and rather interact with them through a single-entry point which provides a GUI (e.g., a web page or a mobile app). Although the interactions with such entry point might be secure, a hacker could trick such systems to send malicious inputs to those internal web services. A typical example is XML injection targeting SOAP communications. Previous work has shown that it is possible to automatically generate such kind of attacks using search-based techniques. In this paper, we improve upon previous results by providing more efficient techniques to generate such attacks. In particular, we investigate four different algorithms and two different fitness functions. A large empirical study, involving also two industrial systems, shows that our technique is effective at automatically generating XML injection attacks.
KW - Evolutionary testing
KW - security testing
KW - XML injection
UR - http://www.scopus.com/inward/record.url?scp=85037651663&partnerID=8YFLogxK
U2 - 10.1109/TSE.2017.2778711
DO - 10.1109/TSE.2017.2778711
M3 - Article
AN - SCOPUS:85037651663
SN - 0098-5589
VL - 45
SP - 335
EP - 362
JO - IEEE Transactions on Software Engineering
JF - IEEE Transactions on Software Engineering
IS - 4
M1 - 8125155
ER -