Mapping software faults with web security vulnerabilities
2008, Proceedings of the International Conference on Dependable Systems and Networks
Abstract
Web applications are typically developed with hard time constraints and are often deployed with critical software bugs, making them vulnerable to attacks. The classification and knowledge of the typical software bugs that lead to security vulnerabilities is of utmost importance. This paper presents a field study analyzing 655 security patches ofsix widely used web applications. Results are compared against other field studies on general software faults (i.e., faults not specifically related to security), showing that only a small subset of software fault types is related to security. Furthermore, the detailed analysis of the code of the patches has shown that web application vulnerabilities result from software bugs affecting a restricted collection of statements.
References (23)
- Valeur, F., Mutz, D., Vigna, G.: "A Learning-Based Approach to the Detection ofSQL Attacks", DIMVA 2005
- Christey, S., "Unforgivable Vulnerabilities", Black Hat Briefings 2007
- Zanero, S., Carettoni, L., Zanchetta, M., "Automatic Detection of Web Application Security Flaws", Black Hat Briefings 2005
- David, P., Stroud, R., "Conceptual Model and Architecture of MAFTIA", LAAS-CNRS, 2003
- Jovanovic, N., Kruegel, C., Kirda, E., "Precise Alias 1-4244-2398-9/08/$20.00 ©2008 IEEE 266 Analysis for Static Detection of Web Application Vulnerabilities", IEEE Symposium on Security and Privacy, 2006 [6] Vnunet, August, 2007, http://www.vnunet.comlvnunet/news/2197408/monster-kept- breach-secret-five
- The Privacy Rights Clearinghouse, December, 2007, http://www.privacyrights.org/ar/ChronDataBreaches.htm
- Stock, A., Williams, 1., Wichers, D., "OWASP top 10", OWASP Foundation, July, 2007
- Steve, C., Martin, R., "Vulnerability Type Distributions in CVE", Mitre report, May, 2007
- Acunetix
- Ltd, February 12, 2007, http://www.acunetix.comlnews/security-audit-results.htm
- NTA, May, 2007, http://www.nta- monitor.comlposts/2007/05/annualsecurityreport.html
- Christmansson, 1., Chillarege, R. "Generation of an Error Set that Emulates Software Faults", Proc. of the 26th IEEE Fault Tolerant Computing Symposium -FCTS-26, 1996.
- Chillarege, R., Bhandari, I. S., Chaar, 1. K., Halliday, M. J., Moebus, D., Ray, B., Wong, M., "Orthogonal Defect Classification -A Concept for In-Process Measurement", IEEE Transactions on Software Engineering, vol. 18, no. 11, pp. 943-956, November 1992.
- Dudies, 1., Madeira, H., "Emulation of Software Faults: a Field Data Study and a Practical Approach", Transactions on Software Engeneering TSE, 2006.
- Maxion, Roy A., Olszewski, Robert T. "Improving Software Robustness with Dependability Cases.", International Symposium on Fault-Tolerant Computing, 1998
- Maxion, Roy A., Olszewski, Robert T. "Eliminating Exception Handling Errors with Dependability Cases: A Comparative, Empirical Study.", IEEE Transactions on Software Engineering, 2000
- Fonseca, 1., Vieira, M., Madeira, H., "Testing and comparing web vulnerability scanning tools for SQL injection and XSS attacks", The 13th IEEE Pacific Rim International Symposium on Dependable Computing, December 2007.
- Nexen.net, February, 2008, http://www.nexen.net/chiffres_cles/phpversion/18164- php_statistics_for_february_2008.php
- Mays, R., Jones, C., Holloway, G., Strudinsky, D., "Experiences with defect prevention", IBM syst. J., vol 29, 1990
- PHP-Nuke, December, 2007, http://phpnuke.org/
- Drupal, December, 2007, http://drupal.org/
- PHP-Fusion, December, 2007, http://PHP-Fusion.co.uk/
- Wordpress, December, 2007, http://wordpress.org/ [24] phpMyadmin, December, 2007, http://www.phpmyadmin.net/