Hunting application-level logical errors

  • Authors:
  • George Stergiopoulos;Bill Tsoumas;Dimitris Gritzalis

  • Affiliations:
  • Information Security and Critical Infrastructure Protection Research Laboratory, Dept. of Informatics, Athens University of Economics and Business (AUEB), Athens, Greece;Information Security and Critical Infrastructure Protection Research Laboratory, Dept. of Informatics, Athens University of Economics and Business (AUEB), Athens, Greece;Information Security and Critical Infrastructure Protection Research Laboratory, Dept. of Informatics, Athens University of Economics and Business (AUEB), Athens, Greece

  • Venue:
  • ESSoS'12 Proceedings of the 4th international conference on Engineering Secure Software and Systems
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Business applications are complex artefacts implementing custom business logic. While much research effort has been put in the identification of technical vulnerabilities (such as buffer overflows and SQL injections), application-level logic vulnerabilities have drawn relatively limited attention, thus putting the application's mission at risk. In this paper, we design, implement, and evaluate a novel heuristic application-independent framework, which combines static and dynamic analysis, input vector, and information extraction analysis, along with a fuzzy logic system, so as to detect and assert the criticality of application-level logic vulnerabilities in Java stand-alone GUI applications.