Web vulnerability static detection method and system based on taint analysis and medium

A taint analysis and static detection technology, applied in the field of network security, can solve the problems of unsupported inter-process analysis, large manual experience, and low detection accuracy, so as to improve detection accuracy, improve detection ability, and reduce false alarm rate Effect

Inactive Publication Date: 2021-08-13
NAT UNIV OF DEFENSE TECH
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The advantage of this type of solution is that it can be quickly updated for new vulnerabilities, but because the regular expression detection rules required by most vulnerabilities are relatively complex, Web application security researchers need to invest a lot of manual experience when using this method; Different vulnerabilities in different applications need to write corresponding regular expressions, and the automatic detection ability is low
Another solution is to perform static detection based on the results of lexical analysis, but it does not support the detection of object-oriented code, does not support inter-procedural analysis, and cannot analyze user-defined functions, resulting in a high rate of false negatives and low detection accuracy. low, limited

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web vulnerability static detection method and system based on taint analysis and medium
  • Web vulnerability static detection method and system based on taint analysis and medium
  • Web vulnerability static detection method and system based on taint analysis and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0051] The following takes the code fragment vul.php containing the command injection vulnerability as an example to illustrate the process of using the static detection method for web vulnerabilities based on taint analysis of the present invention to detect vulnerabilities. For the process diagram, see Figure 4 .

[0052] #vul.php

[0053] php

[0054] include "test.php";

[0055] $dir=$_GET["dir"];

[0056] $dir=str_replace("whoami", "", "$dir");

[0057] system1("ls -al". $dir);

[0058] >

[0059] #test.php

[0060] php

[0061] function system1($command1, $command2){

[0062] $command=$command1.$command2;

[0063] return system($command);

[0064]}

[0065] 1) As shown in Table 1, convert the target php source code vul.php into opcode.

[0066] 2) Stain analysis based on opcode

[0067] As shown in Table 1, the instruction INCLUDE_OR_EVAL is encountered, and the value of its operand op2 is INCLUDE, indicating that this is a file inclusion, so the taint a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a web vulnerability static detection method based on taint analysis. The method comprises the following steps: converting a target source code into an intermediate language; scanning the converted intermediate language, and performing taint analysis in the scanning process; and outputting a taint propagation path formed by all the marked taint variables on the propagation chain from the taint source to the taint convergent point in sequence, and taking the taint propagation path as a web vulnerability detection result; and when the file inclusion relationship exists in the target source code file, starting a new sub-analysis process to perform recursive taint analysis on the included file. Firstly, the static detection accuracy of Web vulnerabilities is improved; according to the invention, the object-oriented codes are well detected by utilizing the semantic accuracy of the intermediate language, so that the detection accuracy is improved, the detection problem of user-defined functions is solved by realizing taint analysis between processes, the detection capability of static detection is improved, and the false alarm rate is reduced.

Description

technical field [0001] The invention belongs to the field of network security, and in particular relates to a static detection method, system and medium for web loopholes based on stain analysis. Background technique [0002] With the development of the Internet, various information sharing platforms (WEB application systems) based on HTML file formats, such as financial online transactions, government e-government, enterprise portals, community forums, and e-commerce, have become more and more perfect, and have penetrated into every aspect of people's lives. drop. However, while the web application sharing platform brings convenience to our lives, it also faces unprecedented challenges: the web application system directly faces the Internet, and the attack behavior of using the web application system as a springboard to invade the server or even control the entire intranet system has become the most common Therefore, how to better detect web vulnerabilities is a research h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/034
Inventor 赵家振杨国正潘祖烈陆余良黄晖于璐钟晓峰
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products