Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering 2014
DOI: 10.1145/2642937.2643012
|View full text |Cite
|
Sign up to set email alerts
|

Derailer

Abstract: Derailer is an interactive tool for finding security bugs in web applications. Using symbolic execution, it enumerates the ways in which application data might be exposed. The user is asked to examine these exposures and classify the conditions under which they occur as security-related or not; in so doing, the user effectively constructs a specification of the application's security policy. The tool then highlights exposures missing security checks, which tend to be security bugs.We have tested Derailer's sca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(5 citation statements)
references
References 23 publications
(21 reference statements)
0
3
0
Order By: Relevance
“…Of a different flavor is Derailer [32]: for security assessments of Web applications, it uses symbolic execution to identify when and how their data gets exposed. The user inspects and evaluates the identified conditions for security concerns, then Derailer points out missing security checks in sensitive areas.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Of a different flavor is Derailer [32]: for security assessments of Web applications, it uses symbolic execution to identify when and how their data gets exposed. The user inspects and evaluates the identified conditions for security concerns, then Derailer points out missing security checks in sensitive areas.…”
Section: Related Workmentioning
confidence: 99%
“…The user inspects and evaluates the identified conditions for security concerns, then Derailer points out missing security checks in sensitive areas. [32] pursues different goals than ours: symbolic execution is the key to obtain exposure data involving specific APIs, but scalability and other concerns typical of a general usage are out of scope. Yet we mention it as one of the few cases where users deal with data (indirectly) derived from a symbolic exploration.…”
Section: Related Workmentioning
confidence: 99%
“…In general, static data flow analysis of a dynamic programming language is difficult to due to the dynamic behavior. Static analysis techniques have been applied to Rails to identify vulnerabilities by several researchers (Chaudhuri and Foster, 2010) (Doupé et al, 2011) (Near and Jackson, 2014).…”
Section: Security Assurance and Agile Developmentmentioning
confidence: 99%
“…Near and Jackson developed a tool called Derailer that performs symbolic execution of Rails by hijacking the existing Ruby runtime. It provides an interactive interface that enables a user to construct the specifications for the application security policy (Near and Jackson, 2014). Our approach also hides the detail of Rails frameworks by preparing a CALib.…”
Section: Security Testing Of Web Applicationmentioning
confidence: 99%
“…Software verification provides the highest degree of software assurance, with its strengths residing in the mathematical concepts that can be leveraged to prove correctness with respect to specific properties. Most notably, bounded verification techniques, such as Alloy [28], have recently received a great deal of attention in the software engineering community (e.g., [8,9,11,13,14,16,20,26,34,35,38,43,46,48,52,54,55,61,63,66]), due to the strength of their automated, yet formally precise, analysis capabilities. The basic idea behind these techniques is to construct a formula that encodes the behavior of a system and examine it up to a user-specified bound.…”
Section: Introductionmentioning
confidence: 99%