State of the Art: Automated Black-Box Web Application Vulnerability Testing
Title | State of the Art: Automated Black-Box Web Application Vulnerability Testing |
Publication Type | Conference Paper |
Year of Publication | 2010 |
Authors | Bau, J., Bursztein, E., Gupta, D., Mitchell, J. |
Conference Name | Security and Privacy (SP), 2010 IEEE Symposium on |
Date Published | May |
Keywords | Automatic testing, Code standards, Computer hacking, Credit cards, Cross Site Scripting, Data security, Decision support systems, Forgery, Personnel, privacy, Probes, SQL Injection, SQLI, XSS |
Abstract | Black-box web application vulnerability scanners are automated tools that probe web applications for security vulnerabilities. In order to assess the current state of the art, we obtained access to eight leading tools and carried out a study of: (i) the class of vulnerabilities tested by these scanners, (ii) their effectiveness against target vulnerabilities, and (iii) the relevance of the target vulnerabilities to vulnerabilities found in the wild. To conduct our study we used a custom web application vulnerable to known and projected vulnerabilities, and previous versions of widely used web applications containing known vulnerabilities. Our results show the promise and effectiveness of automated tools, as a group, and also some limitations. In particular, "stored" forms of Cross Site Scripting (XSS) and SQL Injection (SQLI) vulnerabilities are not currently found by many tools. Because our goal is to assess the potential of future research, not to evaluate specific vendors, we do not report comparative data or make any recommendations about purchase of specific tools. |
URL | http://ieeexplore.ieee.org/document/5504795/ |
DOI | 10.1109/SP.2010.27 |
Citation Key | 5504795 |