2008
DOI: 10.1109/sp.2008.22
|View full text |Cite
|
Sign up to set email alerts
|

Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications

Abstract: Web applications are ubiquitous, perform missioncritical tasks, and handle sensitive user data. Unfortunately, web applications are often implemented by developers with limited security skills, and, as a result, they contain vulnerabilities. Most of these vulnerabilities stem from the lack of input validation. That is, web applications use malicious input as part of a sensitive operation, without having properly checked or sanitized the input values prior to their use.Past research on vulnerability analysis ha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
224
0
3

Year Published

2011
2011
2022
2022

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 258 publications
(229 citation statements)
references
References 29 publications
(28 reference statements)
2
224
0
3
Order By: Relevance
“…Many existing works try to reason about missing and/or insufficient validation to detect as well as prevent these problems e.g., [15][16][17][18][19][20]. The goal of WAVES is orthogonal to these prior works, because it allows the developer to devote the entirety of her input validation development to the server and rest assured that the client validation code will be correct by construction.…”
Section: Improper Input Validationmentioning
confidence: 99%
“…Many existing works try to reason about missing and/or insufficient validation to detect as well as prevent these problems e.g., [15][16][17][18][19][20]. The goal of WAVES is orthogonal to these prior works, because it allows the developer to devote the entirety of her input validation development to the server and rest assured that the client validation code will be correct by construction.…”
Section: Improper Input Validationmentioning
confidence: 99%
“…We believe that these programs are representative of how web applications use regular expression based replacement functions to modify their input (in particular, in a security context, to perform input sanitization), and, thus, are good test cases for our technique. These vulnerable functions were identified and sanitized by Balzarotti et al in [1,2]. Table 5 shows the results of applying our string analysis tool to these programs.…”
Section: Methodsmentioning
confidence: 99%
“…We also experimented with Saner [1] to check these benchmarks. We discuss this tool in related work.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The Saner project [66] combines a similar static component with an additional dynamic step to find real flaws in sanitizer behavior. The Wassermann and Su implementation [7] extends Minamide's grammar-based analysis [6].…”
Section: End-to-end String Analysismentioning
confidence: 99%