Show simple item record

Detection and prevention of logic attacks against web applications through black-box analysis

dc.creatorLi, Xiaowei
dc.date.accessioned2020-08-22T17:00:59Z
dc.date.available2013-12-07
dc.date.issued2013-06-10
dc.identifier.urihttps://etd.library.vanderbilt.edu/etd-05302013-125736
dc.identifier.urihttp://hdl.handle.net/1803/12428
dc.description.abstractThe three-tier web architecture is becoming the de-facto solution for delivering information and business services over the Internet. The center of this architecture is a web application, which implements the business logic, accesses the information stored at the back-end database and interacts with the users through the front-end web server. As web applications get increasingly complex to support sophisticated business functionalities, an emerging class of vulnerabilities, which are referred to as logic vulnerabilities (a.k.a, logic flaws), have attracted increasing attention in recent years. The attacks that target on these vulnerabilities, which are referred to as logic attacks or state violation attacks, have posed serious security threats. To date, very few works have been devoted to the study of the logic vulnerabilities and effective measures to mitigate logic attacks are yet to be developed. Most existing works only target on one specific type of logic vulnerability, and are limited by the availability of application source code and the applicability to specific development languages and platforms. The major challenges come from the fact that application logic flaws and attacks are specific to the functionality of a particular web application and its implementation usually comes without an explicit logic specification. In this dissertation, we aim to address logic attacks against web applications in an automated, general and black-box way (i.e., without requiring the application source code). We present several techniques for automatically deriving the application logic specification by observing and extracting patterns from the interactions between the application and users, as well as the database. Then, we leverage the inferred logic specification for both runtime detection of logic attacks (i.e., defensive approach) and discovery of logic vulnerabilities within web applications (i.e., preventive approach). The defensive approach can be utilized to protect potentially vulnerable web applications that cannot be taken offline for vulnerability analysis, while the preventive approach can help the developers to identify and fix logic flaws within the application implementations so that they are immune to logic attacks. We implemented two prototype systems -- BLOCK and SENTINAL, based on our defensive techniques and three prototypes systems -- LogicScope, EXPELLER, BATMAN, based on our preventive techniques. These prototype systems have different features and focuses. We evaluate them over a set of real world open-source web applications. The experiment results demonstrate the effectiveness of our techniques and prototype systems.
dc.format.mimetypeapplication/pdf
dc.subjectAccess Control
dc.subjectDatabase Access
dc.subjectBlack-box Analysis
dc.subjectLogic Attack
dc.subjectWeb Application Security
dc.subjectLogic Vulnerability
dc.titleDetection and prevention of logic attacks against web applications through black-box analysis
dc.typedissertation
dc.contributor.committeeMemberJanos Sztipanovits
dc.contributor.committeeMemberBradley Malin
dc.contributor.committeeMemberDouglas C. Schmidt
dc.contributor.committeeMemberGautam Biswas
dc.type.materialtext
thesis.degree.namePHD
thesis.degree.leveldissertation
thesis.degree.disciplineComputer Science
thesis.degree.grantorVanderbilt University
local.embargo.terms2013-12-07
local.embargo.lift2013-12-07
dc.contributor.committeeChairYuan Xue


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record