A hybrid analysis framework for detecting web application vulnerabilities

  • Authors:
  • M. Monga;R. Paleari;E. Passerini

  • Affiliations:
  • Univ. degli Studi di Milano, Milan;Univ. degli Studi di Milano, Milan;Univ. degli Studi di Milano, Milan

  • Venue:
  • IWSESS '09 Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Increasingly, web applications handle sensitive data and interface with critical back-end components, but are often written by poorly experienced programmers with low security skills. The majority of vulnerabilities that affect web applications can be ascribed to the lack of proper validation of user's input, before it is used as argument of an output function. Several program analysis techniques were proposed to automatically spot these vulnerabilities. One particularly effective is dynamic taint analysis. Unfortunately, this approach introduces a significant run-time penalty. In this paper, we present a hybrid analysis framework that blends together the strengths of static and dynamic approaches for the detection of vulnerabilities in web applications: a static analysis, performed just once, is used to reduce the run-time overhead of the dynamic monitoring phase. We designed and implemented a tool, called Phan, that is able to statically analyze PHP bytecode searching for dangerous code statements; then, only these statements are monitored during the dynamic analysis phase.