pith. machine review for the scientific record. sign in

arxiv: 1804.00753 · v1 · submitted 2018-04-02 · 💻 cs.CR

Recognition: unknown

Using Unit Testing to Detect Sanitization Flaws

Authors on Pith no claims yet
classification 💻 cs.CR
keywords sanitizationanalysisfunctionsstaticapproachattacksautomaticallydetect
0
0 comments X
read the original abstract

Input sanitization mechanisms are widely used to mitigate vulnerabilities to injection attacks such as cross-site scripting. Static analysis tools and techniques commonly used to ensure that applications utilize sanitization functions. Dynamic analysis must be to evaluate the correctness of sanitization functions. The proposed approach is based on unit testing to bring the advantages of both static and dynamic techniques to the development time. Our approach introduces a technique to automatically extract the sanitization functions and then evaluate their effectiveness against attacks using automatically generated attack vectors. The empirical results show that the proposed technique can detect security flaws cannot find by the static analysis tools.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.