Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities: Difference between revisions
Jump to navigation
Jump to search
Programsam (talk | contribs) |
Programsam (talk | contribs) |
||
| Line 8: | Line 8: | ||
''~F. Brooks, Jr.''</p> | ''~F. Brooks, Jr.''</p> | ||
The war for a trustworthy Internet continues. The popular social networking site Twitter was recently compromised by two cross-site scripting attacks, which are common and easy-to-execute exploits of a codelevel programming error<sup>[5]</sup>. Input validation vulnerabilities<sup>1</sup> like this are in the CWE/SANS Top 25 Most Dangerous Programming Errors for 20102 despite the plethora of proposed techniques for protecting against code-level attacks (e.g. the context sensitive string evaluation method proposed by<sup>[11]</sup>). Additionally, the SANS list of Top Cyber Security Risks<sup>3</sup> indicates that input validation vulnerabilities, such as SQL injection, cross-site scripting, and file inclusion continue to be the three most popular techniques used for compromising web sites. Although techniques such as code reviews and design discussions can help developers reduce the number of vulnerabilities they introduce into the source code, the software development community currently has no single solution that will eliminate all security issues<sup>[7]</sup>. Furthermore, development organizations often do not have the time or resources to perform vulnerability detection efforts on every source file in a product before its release. Validation and verification (V&V) must be prioritized in such a way that the security fortification starts with the files that are most likely to be vulnerable first. SQL hotspots may help development organizations prioritize security fortification efforts. SQL hotspots (or just "hotspots" in this paper) are any point in the application source code where the system interacts with a database management system<sup>[3, 6]</sup>. Hotspots are typically associated with input validation vulnerabilities like SQL injection<sup>4</sup>, but they might also be useful for predicting any web application vulnerability since they protect the typical web application's most valuable asset: the database<sup>[3, 6]</sup>. | The war for a trustworthy Internet continues. The popular social networking site Twitter was recently compromised by two cross-site scripting attacks, which are common and easy-to-execute exploits of a codelevel programming error<sup>[5]</sup>. Input validation vulnerabilities<sup>1</sup> like this are in the CWE/SANS Top 25 Most Dangerous Programming Errors for 20102 despite the plethora of proposed techniques for protecting against code-level attacks (e.g. the context sensitive string evaluation method proposed by<sup>[11]</sup>). Additionally, the SANS list of Top Cyber Security Risks<sup>3</sup> indicates that input validation vulnerabilities, such as SQL injection, cross-site scripting, and file inclusion continue to be the three most popular techniques used for compromising web sites. | ||
Although techniques such as code reviews and design discussions can help developers reduce the number of vulnerabilities they introduce into the source code, the software development community currently has no single solution that will eliminate all security issues<sup>[7]</sup>. Furthermore, development organizations often do not have the time or resources to perform vulnerability detection efforts on every source file in a product before its release. Validation and verification (V&V) must be prioritized in such a way that the security fortification starts with the files that are most likely to be vulnerable first. SQL hotspots may help development organizations prioritize security fortification efforts. SQL hotspots (or just "hotspots" in this paper) are any point in the application source code where the system interacts with a database management system<sup>[3, 6]</sup>. Hotspots are typically associated with input validation vulnerabilities like SQL injection<sup>4</sup>, but they might also be useful for predicting any web application vulnerability since they protect the typical web application's most valuable asset: the database<sup>[3, 6]</sup>. | |||
== 9. References == | |||
== 10. End Notes == | |||