期刊文献+

基于Fuzzing技术的云数据泄露漏洞检测 被引量:1

Cloud Data Leak Vulnerability Detection Based on Fuzzing
原文传递
导出
摘要 目前Web应用上存在接口枚举、越权与敏感信息回传三种逻辑漏洞,在SaaS服务模式的背景下,攻击者利用这些漏洞可以非法获取云端数据,给厂商和用户造成损失.主流的检测方案未实现自动化,依赖测试者经验的渗透测试,难以全面覆盖复杂的Web应用业务逻辑.本文分析云数据服务Web应用的业务逻辑,建立抽象三种逻辑漏洞的威胁模型,设计漏洞Fuzzing检测算法和系统框架,并实现了原型系统.实验结果表明,本文方案可检测造成云数据泄露的三种逻辑漏洞,与人工经验相结合,实现自动化的渗透测试.测试真实Web应用,发现了未被修补的三种逻辑漏洞,并已经得到厂商确认,提升了漏洞挖掘的覆盖度. The business logic vulnerabilities such as interface enumeration,unauthorized access and sensitive information postback widely exist in the present web application,which can be exploited to leak sensitive cloud data under the SaaS service mode,bringing the economic loss to vendors and users.The penetration test,the most popular solution,cannot be applied automatically,for its performance is based on the test experts' experience and not perfect enough under the complex web application architecture.In this situation,in this paper we explored how to automatically detect the vulnerabilities which cause the cloud data leak,based on fuzzing.We analyzed and modeled the business logic of cloud data service web applications,provided a threat model of three representative business logic vulnerabilities,designed a vulnerability detection system,and implemented a prototype system.The experimental results show that the solution could detect potential vulnerabilities,and assist security experts to improve performance on coverage in the penetration test.
作者 姜百合 傅建明 王应军 王亚丽 黄坚伟 JIANG Baihe;FU Jianming;WANG Yingjun;WANG Yali;HUANG Jianwei(Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Wuhan University, Wuhan 430072, Hubei, China;School of Computer, Wuhan University, Wuhan 430072, Hubei, China;Information Center, 62101 Unit, Wuhan 430072, Hubei, China)
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2018年第2期115-120,共6页 Journal of Wuhan University:Natural Science Edition
基金 国家自然科学基金资助项目(U1636107,61373168,61202387)
关键词 WEB应用安全 信息泄露 FUZZING测试 业务逻辑漏洞 Web application security information leak Fuzzing test business logic vulnerabilities
  • 相关文献

参考文献1

二级参考文献24

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/. 被引量:1
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home. 被引量:1
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org. 被引量:1
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7. 被引量:1
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396. 被引量:1
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11]. 被引量:1
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf. 被引量:1
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009. 被引量:1
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009. 被引量:1

共引文献1071

同被引文献5

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部