Abstract
The World Wide Web has become a sophisticated platform capable of delivering a broad range of applications. However, its rapid growth has resulted in numerous security problems that current technologies cannot address. Researchers from both academic and private sector are devoting a considerable amount of resources to the development of Web application security scanners (i.e., automated software testing platforms for Web application security auditing) with some success. However, little is known about their potential side effects. It is possible for an auditing process to induce permanent changes in an application's state. Due to this potential, we have so far avoided large-scale empirical evaluations of our Web Application Vulnerability and Error Scanner (WAVES). In this paper we introduce a testing methodology that allows for harmless auditing, define three testing modes-heavy, relaxed, and safe modes, and report our results from two experiments. In the first, we compared the coverage and side effects of the three scanning modes using 5 real-world Web applications chosen from the 38 found vulnerable in a previous static verification effort. In the second, we used the relaxed mode to conduct a 48-hour test involving 1120 random websites, of which 55 were found to be vulnerable.
Original language | English |
---|---|
Pages (from-to) | 219-230 |
Number of pages | 12 |
Journal | Proceedings of the International Symposium on Software Reliability Engineering, ISSRE |
DOIs | |
State | Published - 2004 |
Externally published | Yes |
Event | ISSRE 2004 Proceedings; 15th International Symposium on Software Reliability Engineering - Saint-Malo, France Duration: 02 11 2004 → 05 11 2004 |