This modified string caused XSS so the dynamic
analyzer could detect XSS vulnerability.
Experimental results showed that using the
proposed approach, the dynamic analyzer could
detect XSS vulnerability because attack string sent
the dynamic analyzer circumvented the web
application filter constraints.
5 CONCLUSION
This paper suggested the platform which stores,
processes, and distributes information between each
analyzer on SDLC. And we verified that proposed
method improves the detection performance of the
dynamic analyzer by approximate 33% through the
experiment on XSS of OWASP Benchmark.
SAST has a limit that the static analyzer can
bring about FP (False Positive), which it detects
wrong vulnerabilities(Chess and McGraw, 2004).
Like a DAST, the problem of SAST can be solved
by interaction (Balzarotti et al., 2007). The platform
can provide the information not only sent from the
static analyzer but also sent form the dynamic
analyzer.
In the future, a research is needed to improve the
detection capability of the static analyzer by
breaking through the problem of SAST using the
information provided by the dynamic analyzer as a
platform.
ACKNOWLEDGEMENTS
This work was supported by Institute for
Information & communications Technology
Promotion (IITP) grant funded by the Korea
government (MSIP) (No.R0190-15-1099,
Development of an integrated management system
and a security testing system that enables interaction
between security vulnerability detection
technologies in development and operation phases of
web application).
REFERENCES
Fu, X., Li, C., 2010. A String Constraint Solver for
Detecting Web Application. In Proc. of International
Conference on Software Engineering and Knowledge
Engineering, pp.535-523.
Kiezun, A., Ganech, V., Guo, P. J., Hooimeijer, P., Emst,
D., 2009. Hampi: A solver for string constraints. In
Proc. of International Symposium on Testing and
Analysis, pp.105-116.
Balzarotti, M., Cova, V., Flmetsger, V., Jovanovic, N.,
Kirda, E., Kruegel, C., Vigna, G., 2008. Saner:
Composing static and dynamic analysis to validate
sanitization in web applications. In Proc. of the IEEE
Symposium on Security and Privacy.
OWASP, 2016. Benchmark. Available at
https://www.owasp.org/index.php/Benchmark.
OWASP, 2015. Zed Attack Proxy(ZAP). Available at
https://www.owasp.org/index.php/OWASP_Zed_Atta
ck_Proxy_Project.
Zheng, Y., Dolby, J., Tripp, O., Ganesh, V., Subramanian,
S., Berzish, M., Zhang, X., 2016. Z3str2: An Efficient
Solver for Strings, Regular Expressions, and Length
Constraints. Formal Methods in Systems Design,
invited paper at the Formal Methods in Systems
Design Journal, vol.50, pp.1-40.
Fu, X., Lu, X., Peltsverger, B., Chen, S., Qian, K., Tao, L.,
2007. A Static Analysis Framework for Detecting
SQL Injection Vulnerabilities. In Proc. of 31st Annual
International Computer Software and Applications
Conference, pp.519-531.
Fasoo Inc., 2016. SPARROW. Available at
http://www.fasoo.com/%EC%8A%A4%ED%8C%A8
%EB%A1%9C%EC%9A%B0-sparrow.
Chess, B., McGraw, G., 2003. Static analysis for security.
In Proc. of the IEEE Symposium on Security and
Privacy, pp.74-79.
Ernst, M. D., 2003. Static and dynamic analysis: synergy
and duality. In Proc. of the ICSE Workshop on
Dynamic Analysis, pp.24-27.
Russo, A., Sabelfeld, A., 2010. Dynamic vs. static flow-
sensitive security analysis. In Proc. IEEE Computer
Security Foundations Symposium, pp.186-199.
Balzarotti, D., Cova, M., Felmetsger, V., Vigna, G., 2007.
Multi-module vulnerability analysis of web-based
applications. In Proc. the 14th Computer and
Communications Security, pp.24-35.
Huang, Y.-W., Yu, F., Hang, C., Tsai, C.-H., Lee, D. T.,
Ku, S.-Y., 2004. Securing Web Application Code by
Static Analysis and Runtime Protection. In Proc. of
the 12th International World Wide Web Conference,
pp40-52.
Wassermann, G., Yu, D., Chander, A., Dhurjati, D.,
Inamura, H., 2008. Dynamic Test Input Generation for
Web Applications. In Proc. of International
Symposium on Software Testing and Analysis, pp.249-
260.
Emmi, M., Majumdar, R., Sen, K., 2007. Dynamic Test
Input Generation for Database Applications. In Proc.
of International Symposium on Software Testing and
Analysis, pp.151-162.
MacDona, N., 2012. Interactive Application Security
Testing. Available at http://blogs.gartner.com/
neil_macdonald/2012/01/30/interactive-application-
security-testing/