@inproceedings{SchuckertHildnerKattetal., author = {Schuckert, Felix and Hildner, Max and Katt, Basel and Langweg, Hanno}, title = {Source Code Patterns of Cross Site Scripting in PHP Open Source Projects}, series = {Proceedings of the 11th Norwegian Information Security Conference (NISK 2018), Sep. 19-20, 2018, Longyearbyen, Svalbard, Norway (NISK Journal ; Vol. 11)}, issn = {1893-6563}, pages = {13}, abstract = {To get a better understanding of Cross Site Scripting vulnerabilities, we investigated 50 randomly selected CVE reports which are related to open source projects. The vulnerable and patched source code was manually reviewed to find out what kind of source code patterns were used. Source code pattern categories were found for sources, concatenations, sinks, html context and fixes. Our resulting categories are compared to categories from CWE. A source code sample which might have led developers to believe that the data was already sanitized is described in detail. For the different html context categories, the necessary Cross Site Scripting prevention mechanisms are described.}, language = {en} } @inproceedings{SchuckertHildnerKattetal., author = {Schuckert, Felix and Hildner, Max and Katt, Basel and Langweg, Hanno}, title = {Source Code Patterns of Buffer Overflow Vulnerabilities in Firefox}, series = {Sicherheit 2018 : Sicherheit, Schutz und Zuverl{\"a}ssigkeit : Konferenzband der 9. Jahrestagung des Fachbereichs Sicherheit in der Gesellschaft f{\"u}r Informatik e. V. (GI) : 25. - 27. April 2018 in Konstanz}, publisher = {Gesellschaft f{\"u}r Informatik e.V.}, address = {Bonn}, isbn = {978-3-88579-675-6}, doi = {10.18420/sicherheit2018_08}, pages = {107 -- 118}, abstract = {We investigated 50 randomly selected buffer overflow vulnerabilities in Firefox. The source code of these vulnerabilities and the corresponding patches were manually reviewed and patterns were identified. Our main contribution are taxonomies of errors, sinks and fixes seen from a developer's point of view. The results are compared to the CWE taxonomy with an emphasis on vulnerability details. Additionally, some ideas are presented on how the taxonomy could be used to improve the software security education.}, language = {en} }