Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Static analysis for detecting taint-style vulnerabilities in Web applications
Jovanovic N., Kruegel C., Kirda E. Journal of Computer Security18 (5):861-907,2010.Type:Article
Date Reviewed: Nov 10 2011

Web applications interact with an uncontrolled and arbitrarily hostile environment. One common attack in such environments involves submitting what is supposed to be harmless data, such as a customer name; however, that data actually contains commands that can be executed by the Web application or its supporting system. Such attacks are known as SQL spoofing, cross-site scripting, and command injection.

Static analysis can determine a Web application’s vulnerability to tainted-data attacks by examining data flow through the application, making sure possibly tainted environmental data is sanitized before it is used. The dynamic languages used to implement Web applications complicate analysis by obscuring necessary type, data access, and control information.

This paper shows how flow-sensitive, interprocedural, and context-sensitive data flow analyses combine to provide effective analysis of applications written in the PHP dynamic language. The analysis hinges on alias analysis to determine the various names by which data are referenced. The authors implemented their analyses in Pixy, a tool that analyzes Web PHP applications. In experiments on seven open-source PHP programs, Pixy found hundreds of new vulnerabilities at high speed, and with variable but usually low false-positive rates.

This work fits naturally in static analysis, although knowledge of static analysis isn’t required. The emphasis on alias analysis and a PHP orientation gives this work its novelty and interest. The paper is easy to read, requiring only general language analysis knowledge, and complete, including pseudocode versions of the alias analysis algorithms as an appendix.

Reviewer:  R. Clayton Review #: CR139578 (1204-0384)
Bookmark and Share
 
Very High-Level Languages (D.3.2 ... )
 
 
Program Analysis (F.3.2 ... )
 
 
Algorithms (I.1.2 )
 
 
Security and Protection (D.4.6 )
 
Would you recommend this review?
yes
no
Other reviews under "Very High-Level Languages": Date
Design of very high-level computer languages
Klerer M., McGraw-Hill, Inc., New York, NY, 1991. Type: Book (9780070350984)
Mar 1 1992
Icon semantics--a formal approach to icon system design
Chang S. International Journal of Pattern Recognition and Artificial Intelligence 1(1): 103-120, 1987. Type: Article
Jun 1 1989
High-level languages and software applications: a reference
Birnes W. (ed), McGraw-Hill, Inc., New York, NY, 1989. Type: Book (9789780070053946)
Mar 1 1990
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy