%0 Conference Proceedings %T A Combinatorial Approach to Analyzing Cross-Site Scripting (XSS) Vulnerabilities in Web Application Security Testing %+ SBA Research %+ University of Texas at Arlington [Arlington] %A Simos, Dimitris, E. %A Kleine, Kristoffer %A Ghandehari, Laleh %A Garn, Bernhard %A Lei, Yu %Z Part 1: Testing Methodologies %< avec comité de lecture %( Lecture Notes in Computer Science %B 28th IFIP International Conference on Testing Software and Systems (ICTSS) %C Graz, Austria %Y Franz Wotawa %Y Mihai Nica %Y Natalia Kushik %I Springer International Publishing %3 Testing Software and Systems %V LNCS-9976 %P 70-85 %8 2016-10-17 %D 2016 %R 10.1007/978-3-319-47443-4_5 %K Combinatorial testing %K XSS %K Fault localization %K Security testing %Z Computer Science [cs] %Z Computer Science [cs]/Networking and Internet Architecture [cs.NI]Conference papers %X Web applications typically employ sanitization functions to sanitize user inputs, independently whether this input is assumed to be legitimate, invalid or malicious. When such functions do not work correctly, a web application immediately becomes vulnerable to security attacks such as XSS. In this paper, we report a combinatorial approach to analyze XSS vulnerabilities in web applications. Our approach first performs combinatorial testing where a set of test vectors is executed against a subject application. If one or more XSS vulnerabilities are triggered during testing, we analyze the structure of each test vector to identify XSS-inducing combinations of its parameter model. If an attack vector contains an XSS-inducing combination, then the execution of this vector will successfully exploit an XSS vulnerability. Identification of XSS-inducing combinations provides insights about which kinds of user input might still be leverageable for XSS attacks and how to correct the function to provide better security guarantees. We conducted an experiment in which our approach was applied to four sanitization functions from the Web Application Vulnerability Scanner Evaluation Project (WAVSEP). The experimental results show that our approach can effectively identify XSS-inducing combinations for these sanitization functions. %G English %Z TC 6 %Z WG 6.1 %2 https://inria.hal.science/hal-01643723/document %2 https://inria.hal.science/hal-01643723/file/419911_1_En_5_Chapter.pdf %L hal-01643723 %U https://inria.hal.science/hal-01643723 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-WG %~ IFIP-TC6 %~ IFIP-WG6-1 %~ IFIP-ICTSS %~ IFIP-LNCS-9976