Multi-party business applications are distributed computer programs implementing collaborative business functions. These applications are one of the main target of attackers who exploit vulnerabilities in order to perform malicious activities. The most prevalent classes of vulnerabilities are the consequence of insufficient validation of the user-provided input. However, the less-known class of logic vulnerabilities recently attracted the attention of researcher. According to the availability of software documentation, two testing techniques can be used: design verification via model checking, and black-box security testing. However, the former offers no support to test real implementations and the latter lacks the sophistication to detect logic flaws. In this thesis, we present two novel security testing techniques to detect logic flaws in multi-party business applicatons that tackle the shortcomings of the existing techniques. First, we present the verification via model checking of two security protocols. We then address the challenge of extending the results of the model checker to automatically test protocol implementations. Second, we present a novel black-box security testing technique that combines model inference, extraction of workflow and data flow patterns, and an attack pattern-based test case generation algorithm. Finally, we discuss the application of the technique developed in this thesis in an industrial setting. We used these techniques to discover previously-unknown design errors in SAML SSO and OpenID protocols, and ten logic vulnerabilities in eCommerce applications allowing an attacker to pay less or shop for free.
from HAL : Dernières publications http://ift.tt/1JiNsGP
Home » Informatique » [tel-01194884] Detection of logic flaws in multi-party business applications via security testing
dimanche 20 septembre 2015
[tel-01194884] Detection of logic flaws in multi-party business applications via security testing
lainnya dari HAL : Dernières publications, Informatique
- [hal-01313749] Temperature dependence of the particle/gas partition coefficient: An application to predict indoor gas-phase concentrations of semi-volatile organic compounds
- [hal-01308004] Impact of the French 3rd and 4th generation pill scare in women seeking termination of pregnancy
- [hal-01290932] An Extension of SPARQL with Fuzzy Navigational Capabilities for Querying Fuzzy RDF Data
- [hal-01343753] Frederic Lee and post-Keynesian pricing theory
- [hal-01108627] From complexity to algebra and back: digraph classes, collapsibility and the PGP
- [hal-01134194] Optimal Transport using Helmholtz-Hodge Decomposition and First-Order Primal-Dual Algorithms
- [hal-01133948] Modélisations de textures par champ gaussien à orientation locale prescrite
- [hal-01170063] A Day-ahead Centralized Unit Commitment Algorithm for A Multi-agent Smart Grid
- [hal-01202398] L’Internet des objets : un nouveau champ d’action pour la cybercriminalité
- [hal-01185255] About Interface Conditions for Coupling Hydrostatic and Nonhydrostatic Navier-Stokes Flows
- [hal-00982087] Towards optimized Schwarz methods for the Navier-Stokes equations
- [hal-01343348] D.1.3 – Protocols for emergent localities
- [hal-01316014] A Methodology for Quality Assessment in Collaborative Score Libraries
- [hal-01343121] Impact de la recherche d'amorces mutées sur les résultats d'analyses métagénomiques
Ditulis Oleh : Unknown // 07:29
Kategori:
Informatique
Inscription à :
Publier les commentaires (Atom)
0 commentaires:
Enregistrer un commentaire