trast to their single use. Discovered vulnerabilities
help manufacturers and integrators of ICS to reduce
the attack vectors of their web applications and im-
proves their security in general.
Future work comprises the improvement of URL
indices in order to reduce false positives. The au-
thentication add-on for selenium needs some work to
extract session data from the used browser engine to
pass them to the WAS. More WAS can be evaluated
and integrated in HelpMeICS to improve its perfor-
mance. Finally, more DUTs can be tested to detect
and analyze even more vulnerabilities.
ACKNOWLEDGEMENTS
This work was supported by the German Federal Min-
istry of Education and Research within the frame-
work of the project KASTEL SKI in the Competence
Center for Applied Security Technology (KASTEL)
and by the Ministry of Economy, Labor and Hous-
ing, Baden-W
¨
urttemberg, within the research project
CyberProtect.
REFERENCES
Alassmi, S., Zavarsky, P., Lindskog, D., Ruhl, R., Alasiri,
A., and Alzaidi, M. (2012). An analysis of the ef-
fectiveness of black-box web application scanners in
detection of stored xssi vulnerabilities. International
Journal of Information Technology and Computer Sci-
ence, 4(1).
Bau, J., Bursztein, E., Gupta, D., and Mitchell, J. (2010).
State of the art: Automated black-box web applica-
tion vulnerability testing. In 2010 IEEE Symposium
on Security and Privacy, pages 332–345. IEEE.
BSI (2019). Industrial control system security. Technical
report, German Federal Office for Information Secu-
rity, Publications on Cyber-Security.
Deepa, G., Thilagam, P. S., Praseed, A., and Pais, A. R.
(2018). Detlogic: A black-box approach for detecting
logic vulnerabilities in web applications. Journal of
Network and Computer Applications, 109:89–109.
Doup
´
e, A., Cavedon, L., Kruegel, C., and Vigna, G. (2012).
Enemy of the state: A state-aware black-box web vul-
nerability scanner. In Presented as part of the 21st
USENIX Security Symposium (USENIX Security 12),
pages 523–538.
Doup
´
e, A., Cova, M., and Vigna, G. (2010). Why johnny
can’t pentest: An analysis of black-box web vulner-
ability scanners. In International Conference on De-
tection of Intrusions and Malware, and Vulnerability
Assessment, pages 111–131. Springer.
Esposito, D., Rennhard, M., Ruf, L., and Wagner, A.
(2018). Exploiting the potential of web application
vulnerability scanning. In ICIMP 2018, Spain, July
22-26, 2018, pages 22–29. IARIA.
Felderer, M., B
¨
uchler, M., Johns, M., Brucker, A. D., Breu,
R., and Pretschner, A. (2016). Security testing: A sur-
vey. In Advances in Computers, volume 101, pages
1–51. Elsevier.
Ferreira, A. M. and Kleppe, H. (2011). Effectiveness of
automated application penetration testing tools.
Fonseca, J., Vieira, M., and Madeira, H. (2007). Testing and
comparing web vulnerability scanning tools for sql in-
jection and xss attacks. In 13th Pacific Rim interna-
tional symposium on dependable computing (PRDC
2007), pages 365–372. IEEE.
Galloway, B. and Hancke, G. P. (2012). Introduction to
industrial control networks. IEEE Communications
surveys & tutorials, 15(2):860–880.
Idrissi, S., Berbiche, N., Guerouate, F., and Shibi, M.
(2017). Performance evaluation of web application se-
curity scanners for prevention and protection against
vulnerabilities. International Journal of Applied En-
gineering Research, 12(21):11068–11076.
IEC62443 (2019). IEC-62443: Security for industrial au-
tomation and control systems. Standard, International
Electrotechnical Commission.
Khoury, N., Zavarsky, P., Lindskog, D., and Ruhl, R.
(2011). An analysis of black-box web application se-
curity scanners against stored sql injection. In 2011
IEEE Third International Conference on Privacy, Se-
curity, Risk and Trust and 2011 IEEE Third Interna-
tional Conference on Social Computing, pages 1095–
1101. IEEE.
Langner, R. (2011). Stuxnet: Dissecting a cyberwarfare
weapon. IEEE Security & Privacy, 9(3):49–51.
Makino, Y. and Klyuev, V. (2015). Evaluation of web vul-
nerability scanners. In 2015 IEEE 8th International
Conference on Intelligent Data Acquisition and Ad-
vanced Computing Systems: Technology and Applica-
tions (IDAACS), volume 1, pages 399–402. IEEE.
McAllister, S., Kirda, E., and Kruegel, C. (2008). Lever-
aging user interactions for in-depth testing of web
applications. In International Workshop on Recent
Advances in Intrusion Detection, pages 191–210.
Springer.
Pfrang, S., Borcherding, A., Meier, D., and Beyerer, J.
(2019). Automated security testing for web applica-
tions on industrial automation and control systems. at-
Automatisierungstechnik, 67(5):383–401.
Pfrang, S., Meier, D., and Kautz, V. (2017). Towards a mod-
ular security testing framework for industrial automa-
tion and control systems: Isutest. 2017 22nd IEEE
International Conference on Emerging Technologies
and Factory Automation (ETFA).
Suteva, N., Zlatkovski, D., and Mileva, A. (2013). Evalu-
ation and testing of several free/open source web vul-
nerability scanners.
Vega, E. A. A., Orozco, A. L. S., and Villalba, L. J. G.
(2017). Benchmarking of pentesting tools. Inter-
national Journal of Computer and Information Engi-
neering, 11(5):602–605.
SECRYPT 2020 - 17th International Conference on Security and Cryptography
38