Filters








6,989 Hits in 5.3 sec

A Formal Approach to Exploiting Multi-stage Attacks Based on File-System Vulnerabilities of Web Applications [chapter]

Federico De Meo, Luca Viganò
2017 Lecture Notes in Computer Science  
We give a formal representation of web applications, databases and filesystems, and show how to reason about file-system vulnerabilities.  ...  We also show how to combine file-system vulnerabilities and SQL-Injection vulnerabilities for the identification of complex, multi-stage attacks.  ...  Our approach addresses this by automating the identification of attacks that exploit such multi-stage vulnerabilities. Contributions Our contributions are two-fold.  ... 
doi:10.1007/978-3-319-62105-0_13 fatcat:b7it64t7ovfmtkjq4zlydlaj4a

On Computing Enterprise IT Risk Metrics [chapter]

Sandeep Bhatt, William Horne, Prasad Rao
2011 IFIP Advances in Information and Communication Technology  
We present a systematic approach to quantify and automatically compute the risk profile of an enterprise from information about individual vulnerabilities contained in CVSS scores.  ...  Defining and computing appropriate vulnerability metrics to support decision making remains a challenge.  ...  The intuition behind path weight is that the likelihood of a multi-stage attack depends not only on the exploitability of the intermediate nodes, but also on the length of the path; multi-stage exploits  ... 
doi:10.1007/978-3-642-21424-0_22 fatcat:u4scw4rf6rhjdpewr774bzflse

Attack Graph Generation and Analysis Techniques

Mridul Sankar Barik, Anirban Sengupta, Chandan Mazumdar
2016 Defence Science Journal  
This paper presents a consolidated view of major attack graph generation and analysis techniques.  ...  Since its introduction a considerable amount of research effort has been spent in the development of theory and practices around the idea of attack graph.  ...  Host H1 is running a vulnerable version of Apache web server, which has vulnerability (CVE-2006-3747) that allows a remote attacker to exploit and gain user privilege on the Web Server.  ... 
doi:10.14429/dsj.66.10795 fatcat:qfklg22ienfkrflngqwyrdd6au

An Automated Approach to Generate Web Applications Attack Scenarios

E. Alata, M. Kaaniche, V. Nicomette, R. Akrout
2013 2013 Sixth Latin-American Symposium on Dependable Computing  
Our approach aims to move a step forward toward the automation of this process.  ...  The paper presents the main concepts behind the proposed approach and an example that illustrates the main steps of the algorithm leading to the identification of the vulnerabilities of a Web application  ...  ACKNOWLEDGMENT This work was supported by the Agence Nationale de la Recherche through project DALI and by the french project Secure Virtual Cloud.  ... 
doi:10.1109/ladc.2013.22 dblp:conf/ladc/AlataKNA13 fatcat:zlfjfshdwbhhhdiouy6uiipqz4

Semantics-aware detection of targeted attacks: a survey

Robert Luh, Stefan Marschalek, Manfred Kaiser, Helge Janicke, Sebastian Schrittwieser
2016 Journal in Computer Virology and Hacking Techniques  
However, few of these solutions have a particular focus on Advanced Persistent Threats or similarly sophisticated multi-stage attacks.  ...  To overcome these obstacles, we present a structured review of semantics-aware works that have a high potential for contributing to the analysis or detection of targeted attacks.  ...  The financial support by the Austrian Federal Ministry of Science, Research and Economy and the National Foundation for Research, Technology and Development is gratefully acknowledged.  ... 
doi:10.1007/s11416-016-0273-3 fatcat:flhbpc4uwbandby2adxi62t64u

Automated Security Analysis of Dynamic Web Applications through Symbolic Code Execution

Giovanni Agosta, Alessandro Barenghi, Antonio Parata, Gerardo Pelosi
2012 2012 Ninth International Conference on Information Technology - New Generations  
The automatic identification of security vulnerabilities is a critical issue in the development of web-based applications.  ...  We present a methodology and tool for vulnerability identification based on symbolic code execution exploiting Static Taint Analysis to improve the efficiency of the analysis.  ...  The proposed approach exploits a formal description of the program control flow and data flow to spot inter-procedural vulnerability patterns which are ignored by pure expression matching approaches.  ... 
doi:10.1109/itng.2012.167 dblp:conf/itng/AgostaBPP12 fatcat:vvp6gc3ezrb4dii6ob4npr4exq

Supporting automated vulnerability analysis using formalized vulnerability signatures

Mohamed Almorsy, John Grundy, Amani S. Ibrahim
2012 Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering - ASE 2012  
Hackers can easily exploit vulnerabilities in such publically accessible services. In addition to, 75% of the total reported application vulnerabilities are web application specific.  ...  Although this helps to minimize cost and increase availability and reachability of applications, it has serious implications on applications' security.  ...  ACKNOWLEDGEMENTS The authors are grateful to Swinburne University of Technology and the FRST SPPI project for support for this research.  ... 
doi:10.1145/2351676.2351691 dblp:conf/kbse/AlmorsyGI12 fatcat:stzi4hevergi3iffmptejzdgzq

Formal Analysis of Vulnerabilities of Web Applications Based on SQL Injection [chapter]

Federico De Meo, Marco Rocchetto, Luca Viganò
2016 Lecture Notes in Computer Science  
We present a formal approach for the analysis of attacks that exploit SQLi to violate security properties of web applications.  ...  We give a formal representation of web applications and databases, and show that our formalization effectively exploits SQLi attacks.  ...  Our approach addresses this by automating the identification of attacks that exploit a SQLi.  ... 
doi:10.1007/978-3-319-46598-2_13 fatcat:ipbs4yafwzbupk5jeptqsuz4fq

Generation and Analysis of Attack Graphs

Chunying Wang, Ning Du, Huijing Yang
2012 Procedia Engineering  
In this paper we present an automated technique for generating and analyzing attack graphs.  ...  We implemented our technique in a tool suite and tested it on a small network example, which includes models of a firewall and an intrusion detection system.  ...  Attack models and attack graphs Although our primary interest is in multi-stage cyber-attacks against computer networks, we define the attack graph formalism abstractly as a scenario graph for a model  ... 
doi:10.1016/j.proeng.2012.01.618 fatcat:i4obveiyxvh25g54llc35za4mu

Formal Analysis of Vulnerabilities of Web Applications Based on SQL Injection (Extended Version) [article]

Federico De Meo, Marco Rocchetto, Luca Viganò
2016 arXiv   pre-print
We present a formal approach that exploits attacks related to SQL Injection (SQLi) searching for security flaws in a web application.  ...  We give a formal representation of web applications and databases, and show that our formalization effectively exploits SQLi attacks.  ...  Our approach addresses this by automating the identification of attacks that exploit a SQLi.  ... 
arXiv:1605.00358v2 fatcat:3i46qmej3bfmpbamwhj6jwp57y

Don't Wait to be Breached! Creating Asymmetric Uncertainty of Cloud Applications via Moving Target Defenses [article]

Kennedy A. Torkura and Christoph Meinel and Nane Kratzke
2019 arXiv   pre-print
On the application level, the vertical and horizontal attack surface is continuously modified to circumvent successful replays of formerly scripted attacks.  ...  At least against zero-day exploits, this approach is often toothless.  ...  The authors would like to thank Bob Duncan from the University of Aberdeen for his inspiring thoughts on cloud security challenges.  ... 
arXiv:1901.04319v1 fatcat:5h6t745fhncifhxs3j7nqr5l7i

Opportunistic Diversity-Based Detection of Injection Attacks in Web Applications

Wenyu Qu, Wei Huo, Lingyu Wang
2018 EAI Endorsed Transactions on Security and Safety  
At the same time, larger attack surfaces and developers' lack of security proficiency or awareness leave Web applications particularly vulnerable to security attacks.  ...  Finally, we evaluate our approach using a real world Web application.  ...  Acknowledgements Authors with Concordia University were partially supported by the Natural Sciences and Engineering Research Council of Canada under Discovery Grant N01035.  ... 
doi:10.4108/eai.11-12-2018.156032 fatcat:4rbyn3sgfnctboeft44ng5f7zu

Automated State Machines Applied in Client Honeypots

Yaser Alosefer, Omer Rana
2010 2010 5th International Conference on Future Information Technology  
One of the first approaches to detect malware is to compare an infected application against a clean copy of the same application or a formal specification to detect the malicious code [8] [9] .  ...  In our work, we need to model web-based attacks, in which a malicious web page attacks the end-user's system through a web browser in stages, and each stage causes a transition from one stage to another  ... 
doi:10.1109/futuretech.2010.5482695 fatcat:n6xgujmyeng6lmqgqwoou52cfy

Automated Security Assessment for the Internet of Things [article]

Xuanyu Duan, Mengmeng Ge, Triet H. M. Le, Faheem Ullah, Shang Gao, Xuequan Lu, M. Ali Babar
2021 arXiv   pre-print
Internet of Things (IoT) based applications face an increasing number of potential security risks, which need to be systematically assessed and addressed.  ...  We evaluate the viability of our approach using a proof-of-concept smart building system model which contains a variety of real-world IoT devices and potential vulnerabilities.  ...  ATs describe the security of systems formally and systematically by presenting various means by which a system can be attacked [6] .  ... 
arXiv:2109.04029v1 fatcat:i7dshjtas5dyzhlcasdkae4toa

Using a virtual security testbed for digital forensic reconstruction

André Årnes, Paul Haas, Giovanni Vigna, Richard A. Kemmerer
2006 Journal in Computer Virology  
Two examples are given to demonstrate the approach; one overview example based on the Trojan defense and one detailed example of a multi-step attack.  ...  This paper presents ViSe, a virtual security testbed, and demonstrates how it can be used to efficiently study computer attacks and suspect tools as part of a computer crime reconstruction.  ...  The "Centre for Quantifiable Quality of Service in Communication Systems, Centre of Excellence" is appointed by The Research Council of Norway, and funded by the Research Council, NTNU and UNINETT.  ... 
doi:10.1007/s11416-006-0033-x fatcat:j2iq2ggfdvhupaa4cywucejrcm
« Previous Showing results 1 — 15 out of 6,989 results