Effective Dynamic Taint Analysis of Java Web Applications
- DOI
- 10.2991/978-94-6463-030-5_97How to use a DOI?
- Keywords
- Dynamic Taint Analysis; Vulnerability Discovery; Computer Technology; Dataflow Analysis; Web Security
- Abstract
With the rapid development of the Internet, network security is the most important issue for businesses and people. Vulnerabilities caused by user input and not treated harmlessly are the easiest to be exploited by hackers. In this paper, a tool named FastTaint is implemented, by using the principle of dynamic taint analysis, the vulnerability detection rate is high and the false positive rate is extremely low. First, the FastTaint tool is based on the proxy mode of behavior injection mode; then there are different instrumentation strategies for Source, Propagator, Sanitizer and Sink to make the detection range more accurate; finally, the taint is marked at the object level and the vulnerability is determined at the leaking point. The FastTaint tool abandons the traditional firewall that relies on the characteristics of requests to detect attacks and creatively uses Interactive Application Security Testing (IAST) technology. It is injected directly into the protected application’s service to provide real-time, function-level protection, and can update the strategy without updating and detect or prevent unknown vulnerabilities without updating the protected application’s code. Experiments show that this tool can quickly and efficiently detect multiple vulnerabilities without requiring the source code, FastTaint can detect multiple vulnerabilities, such as SQL Injection, Cross-Site Request Scripting, Path Traversal, Insecure Forwarding, XPath Injection, OS Injection, SSRF and other vulnerabilities.
- Copyright
- © 2023 The Author(s)
- Open Access
- Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.
Cite this article
TY - CONF AU - Yan Huang AU - Chaohui He AU - Chenglong He AU - Chaoyong Wang PY - 2022 DA - 2022/12/20 TI - Effective Dynamic Taint Analysis of Java Web Applications BT - Proceedings of the 2022 International Conference on Bigdata Blockchain and Economy Management (ICBBEM 2022) PB - Atlantis Press SP - 987 EP - 997 SN - 2589-4919 UR - https://doi.org/10.2991/978-94-6463-030-5_97 DO - 10.2991/978-94-6463-030-5_97 ID - Huang2022 ER -