An Ad Hoc Writable Rule Language for White-Box Security Scanners Author:Sebastian Schinzel Referent:Prof. Dr. Alexander del Pino Korreferent:Prof. Dr.

Slides:



Advertisements
Similar presentations
Approaches to meeting the PCI Vulnerability Management and Penetration Testing Requirements Clay Keller.
Advertisements

CLEARSPACE Digital Document Archiving system INTRODUCTION Digital Document Archiving is the process of capturing paper documents through scanning and.
Chapter 17: WEB COMPONENTS
A mobile single sign-on system Master thesis 2006 Mats Byfuglien.
An investigation into the security features of Oracle 10g R2 Enterprise Edition Supervisor: Mr J Ebden.
POC Security System High security system combining PIN-on-Card, information security, physical access, control and alarm – all in one system.
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
1 No Silver Bullet : Inherent Limitations of Computer Security Technologies Jeffrey W. Humphries Texas A&M University.
Some general principles in computer security Tomasz Bilski Chair of Control, Robotics and Computer Science Poznań University.
August 1, 2006 Software Security. August 1, 2006 Essential Facts Software Security != Security Features –Cryptography will not make you secure. –Application.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
SOFTWARE SECURITY TESTING IS IMPORTANT, DIFFERENT AND DIFFICULT Review by Rayna Burgess 4/21/2011.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
Computer Security and Penetration Testing
Chapter 4 Application Security Knowledge and Test Prep
BUILDING A SECURE STANDARD LIBRARY Information Assurance Project I MN Tajuddin hj. Tappe Supervisor Mdm. Rasimah Che Mohd Yusoff ASP.NET TECHNOLOGY.
Software Security Course Course Outline Course Overview Introduction to Software Security Common Attacks and Vulnerabilities Overview of Security.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
IOTA Improved Design and Implementation of a Modular and Extensible Website Framework Andrew Hamilton – TJHSST Computer Systems Lab Abstract.
ISOM MIS3150 Data and Info Mgmt Database Security Arijit Sengupta.
Joel Bapaga on Web Design Strategies Technologies Commercial Value.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Approaches to Application Security – DSM
A Framework for Automated Web Application Security Evaluation
CS 325: Software Engineering April 14, 2015 Software Security Security Requirements Software Security in the Life Cycle.
Preventing SQL Injection Attacks in Stored Procedures Alex Hertz Chris Daiello CAP6135Dr. Cliff Zou University of Central Florida March 19, 2009.
Attacking Applications: SQL Injection & Buffer Overflows.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
OWASP Top Ten #1 Unvalidated Input. Agenda What is the OWASP Top 10? Where can I find it? What is Unvalidated Input? What environments are effected? How.
1 Vulnerability Assessment of Grid Software James A. Kupsch Computer Sciences Department University of Wisconsin Condor Week 2007 May 2, 2007.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
1 ITGD 2202 Supervision:- Assistant Professor Dr. Sana’a Wafa Al-Sayegh Dr. Sana’a Wafa Al-SayeghStudent: Anwaar Ahmed Abu-AlQumboz.
Security Attacks CS 795. Buffer Overflow Problem Buffer overflows can be triggered by inputs that are designed to execute code, or alter the way the program.
TEST-1 6. Testing & Refactoring. TEST-2 How we create classes? We think about what a class must do We focus on its implementation We write fields We write.
OWASP ESAPI SwingSet An introduction by Fabio Cerullo.
Building Secure Web Applications With ASP.Net MVC.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
MANUAL TESTING KS SESSION PRESENTED BY 26/11/015 VISHAL KUMAR.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
EECS 354: Network Security Group Members: Patrick Wong Eric Chan Shira Schneidman Web Attacks Project: Detecting XSS and SQL Injection Vulnerabilities.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Introduction SQL Injection is a very old security attack. It first came into existence in the early 1990's ex: ”Hackers” movie hero does SQL Injection.
Smashing WebGoat for Fun and Research: Static Code Scanner Evaluation Josh Windsor & Dr. Josh Pauli.
Web Application Security
SOFTWARE TESTING Date: 29-Dec-2016 By: Ram Karthick.
CMSC 345 Defensive Programming Practices from Software Engineering 6th Edition by Ian Sommerville.
Module: Software Engineering of Web Applications
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
Design for Security Pepper.
Chapter 7: Identifying Advanced Attacks
Security Testing Methods
Software Security Testing
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Website Security Testing: Why Business Need It Very Badly.
Web Application Security
An Introduction to Web Application Security
Introduction to Software Testing
A mobile single sign-on system
Security at the Source.
Zach Garcia Keith Reiter
WWW安全 國立暨南國際大學 資訊管理學系 陳彥錚.
Presentation transcript:

An Ad Hoc Writable Rule Language for White-Box Security Scanners Author:Sebastian Schinzel Referent:Prof. Dr. Alexander del Pino Korreferent:Prof. Dr. Alois Schütte Cross SQL Buffer document.write(‘<img src=“ + document.cookie + ‘”>’); Site Scripting SELECT user FROM authentication WHERE username=‘administrator’ AND password=‘’ OR ‘1’=‘1’ Injection - while(‘\0’ != *src_ptr) { *dst_ptr++ = *src_ptr++; } Overflow More than two thirds of the German population use the Internet for entertainment, communication, and for business purposes. To protect users and service providers from computer crime, data gets encrypted, access authorisations are checked, and Firewalls are installed to protect applications However, the effectiveness of these security mechanisms depends significantly on their correct implementation. If security mechanisms in applications are flawed, an attacker may be able to circumvent the mechanisms and may cause great damages. Locating and preventing security vulnerabilities in software development has been a research topic for decades. Facing the fast growing Internet, security assurance is becoming an integral part of web software development. However, manual security assessments can be complex and expensive. Because of this, tools are developed to automate the search for security vulnerabilities. These tools are called security scanners. Security scanners can be distinguished in two groups: white-box scanners can access the internal structure of the target application such as source code. As opposed to that, black-box scanners approach the target application solely through external interfaces. They have only access to input and output of the target application. Consequently, white-box scanners have much more information on hand about the target application. They are able to search for security vulnerabilities more effectively compared to black-box scanners. Many static white-box scanners aim at conducting fully automated security audits. In doing so, the user of the scanner has hardly any possibilities to control internal activities of the scanner. Static white-box scanners often take source code as input, process it, and produce a report about found possible security vulnerabilities in the source code. Customisation of currently existing scanners is difficult or not possible at all. Because of this, the ”intelligence” of existing scanners is mostly limited to a fixed rule set. Thus, the value of such a scanner is limited, even for a security expert. The user hardly gets information about the patterns the scanner searches for, about where the scanner searched, and which patterns where omitted during the search. To make the handling of scanners more comprehen- sible, I develop a rule language for static white- box scanner in this thesis. This rule language can be used to look for complex source code patterns that may lead to security vulnerabilities. The rule language respects common quality characteristics of programming languages such as maintainability. New rules can be written during a security audit in an ad hoc manner. It enables the user to search for complex patterns in source code and presents the main user interface to the scanner. Furthermore, the rule language is able to support all common programming languages such as C, C++, C#, Java, JavaScript, and ABAP.