Volltext-Downloads (blau) und Frontdoor-Views (grau)
The search result changed since you submitted your search request. Documents might be displayed in a different sort order.
  • search hit 2 of 881
Back to Result List

Insecurity Refactoring: Automated Injection of Vulnerabilities in Source Code

  • Insecurity Refactoring is a change to the internal structure of software to inject a vulnerability without changing the observable behavior in a normal use case scenario. An implementation of Insecurity Refactoring is formally explained to inject vulnerabilities in source code projects by using static code analysis. It creates learning examples with source code patterns from known vulnerabilities. Insecurity Refactoring is achieved by creating an Adversary Controlled Input Dataflow tree based on a Code Property Graph. The tree is used to find possible injection paths. Transformation of the possible injection paths allows to inject vulnerabilities. Insertion of data flow patterns introduces different code patterns from related Common Vulnerabilities and Exposures (CVE) reports. The approach is evaluated on 307 open source projects. Additionally, insecurity-refactored projects are deployed in virtual machines to be used as learning examples. Different static code analysis tools, dynamic tools and manual inspections are used with modified projects to confirm the presence of vulnerabilities. The results show that in 8.1% of the open source projects it is possible to inject vulnerabilities. Different inspected code patterns from CVE reports can be inserted using corresponding data flow patterns. Furthermore the results reveal that the injected vulnerabilities are useful for a small sample size of attendees (n=16). Insecurity Refactoring is useful to automatically generate learning examples to improve software security training. It uses real projects as base whereas the injected vulnerabilities stem from real CVE reports. This makes the injected vulnerabilities unique and realistic.

Export metadata

Additional Services

Search Google Scholar

Statistics

frontdoor_oas
Metadaten
Author:Felix SchuckertORCiD, Basel KattORCiD, Hanno LangwegORCiDGND
DOI:https://doi.org/10.1016/j.cose.2023.103121
ISSN:0167-4048
eISSN:1872-6208
Parent Title (English):Computers & Security
Volume:128
Publisher:Elsevier
Document Type:Article
Language:English
Year of Publication:2023
Release Date:2023/05/15
Tag:Web security; Static code analysis; Refactoring; Vulnerability Pattern; PHP; SQLi; XSS
Page Number:18
Article Number:103121
Open Access?:Ja
Relevance:Peer reviewed Publikation in Master Journal List
Licence (German):License LogoCreative Commons - CC BY - Namensnennung 4.0 International