一種XSS漏洞灰盒檢測方案的設(shè)計與實現(xiàn)
[Abstract]:The rapid development of Web applications not only provides convenience for people's work and life, but also brings more and more security threats. Among them, cross-site script attack XSS is the most harmful. Attackers can take advantage of XSS vulnerabilities to control the target host, and can also combine other attacks to carry out further attacks, which seriously threaten the security of users' privacy information and property. Therefore, it is particularly important to detect XSS security vulnerabilities in web applications efficiently. According to the analysis, the most effective method to detect this vulnerability is to carry out manual code audit, but this process is quite tedious and expensive. At present, most of the automatic detection techniques use a large number of attack loads for black box testing, but black box testing can not traverse all the logic resulting in a large number of missed reports, and the accuracy is low. The static code audit technology is also poor in the discovery of Dom XSS security vulnerabilities, and the compatibility is insufficient. In order to solve the above problems, on the premise of having the source code of the protected target website, this paper studies and designs the gray box detection scheme "XSScan", which is used to detect reflective, storage and Dom XSS vulnerabilities. The main results of the study are as follows: 1. This paper uses compilation principle technology to construct abstract syntax tree and program control flow diagram of source code for reflective and storage XSS, reviews all called sensitive functions, and then tracks and analyzes the data flow of sensitive parameters in the above functions. Finally, dynamic verification is carried out to check for XSS vulnerability. It can not only find all the possible vulnerabilities fundamentally, but also reduce the false alarm rate of the system by dynamic black box verification method, which significantly improves the efficiency of audit work. 2. Aiming at Dom XSS, which makes use of the powerful function of headless browser PhantomJS, during the parsing and execution of JavaScript script, JavaScript and WebKit rendering engine are cracked by propagating contaminated signal, and whether the polluted signal is output is detected at all DOM output points. This method greatly reduces the false alarm rate and false positive rate of Dom type XSS detection, and makes up for the shortcomings of the above gray box scheme in detecting Dom type XSS. The "XSScan" detection system is implemented by coding. The test results show that the "XSScan" system can detect the XSS vulnerability in Web system more efficiently and accurately. Compared with the same kind of XSS detection tools, the operation efficiency is improved, and the false alarm rate and false alarm rate are also reduced to a certain extent.
【學(xué)位授予單位】:電子科技大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2017
【分類號】:TP393.08
【參考文獻(xiàn)】
相關(guān)期刊論文 前10條
1 孫偉;張凱寓;薛臨風(fēng);徐田華;;XSS漏洞研究綜述[J];信息安全研究;2016年12期
2 李潔;俞研;吳家順;;基于動態(tài)污點分析的DOM XSS漏洞檢測算法[J];計算機應(yīng)用;2016年05期
3 李威;李曉紅;;Web應(yīng)用存儲型XSS漏洞檢測方法及實現(xiàn)[J];計算機應(yīng)用與軟件;2016年01期
4 張海燕;莫勇;;基于決策樹分類的跨站腳本攻擊檢測方法[J];微型機與應(yīng)用;2015年16期
5 鮑澤民;王根英;李娟;;跨站腳本攻擊客戶端防御技術(shù)研究[J];鐵路計算機應(yīng)用;2015年07期
6 王永樂;葛洪央;;淺析Cookies欺騙攻擊與防御策略[J];信息技術(shù);2014年08期
7 李欣;孫珊珊;;XSS攻擊的研究與防范[J];黑河學(xué)院學(xué)報;2013年06期
8 邱永華;;XSS跨站腳本攻擊剖析與防御[J];中國科技信息;2013年20期
9 徐博文;曹維華;劉春暉;朱華虹;;基于Javascript蠕蟲的實時會話劫持攻擊技術(shù)研究[J];計算機安全;2013年09期
10 李冰;趙逢禹;;Stored-XSS漏洞檢測的研究與設(shè)計[J];計算機應(yīng)用與軟件;2013年03期
相關(guān)碩士學(xué)位論文 前4條
1 徐浩然;基于代理的跨站腳本攻擊檢測技術(shù)研究[D];電子科技大學(xué);2016年
2 左丹丹;Web應(yīng)用程序的跨站腳本漏洞檢測問題的研究[D];北京工業(yè)大學(xué);2015年
3 牛皓;基于網(wǎng)絡(luò)爬蟲的XSS漏洞檢測系統(tǒng)的研究與設(shè)計[D];北京郵電大學(xué);2015年
4 趙艷;基于網(wǎng)絡(luò)爬蟲的跨站腳本漏洞動態(tài)檢測技術(shù)研究[D];西南交通大學(xué);2011年
,本文編號:2484308
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/2484308.html