Multi-party business applications are distributed computer programs implementing collaborative business functions. These applications are one of the main target of attackers who exploit vulnerabilities in order to perform malicious activities. The most prevalent classes of vulnerabilities are the consequence of insufficient validation of the user-provided input. However, the less-known class of logic vulnerabilities recently attracted the attention of researcher. According to the availability of software documentation, two testing techniques can be used: design verification via model checking, and black-box security testing. However, the former offers no support to test real implementations and the latter lacks the sophistication to detect logic flaws. In this thesis, we present two novel security testing techniques to detect logic flaws in multi-party business applicatons that tackle the shortcomings of the existing techniques. First, we present the verification via model checking of two security protocols. We then address the challenge of extending the results of the model checker to automatically test protocol implementations. Second, we present a novel black-box security testing technique that combines model inference, extraction of workflow and data flow patterns, and an attack pattern-based test case generation algorithm. Finally, we discuss the application of the technique developed in this thesis in an industrial setting. We used these techniques to discover previously-unknown design errors in SAML SSO and OpenID protocols, and ten logic vulnerabilities in eCommerce applications allowing an attacker to pay less or shop for free.
from HAL : Dernières publications http://ift.tt/1JiNsGP
Home » Informatique » [tel-01194884] Detection of logic flaws in multi-party business applications via security testing
dimanche 20 septembre 2015
[tel-01194884] Detection of logic flaws in multi-party business applications via security testing
lainnya dari HAL : Dernières publications, Informatique
Ditulis Oleh : Unknown // 07:29
Kategori:
Informatique
Inscription à :
Publier les commentaires (Atom)
0 commentaires:
Enregistrer un commentaire