论文标题
Web系统安全性的变质测试
Metamorphic Testing for Web System Security
论文作者
论文摘要
安全测试旨在验证该软件符合其安全属性。但是,在现代Web系统中,这通常需要验证使用非常大的输入行使系统时产生的输出。因此,需要完全自动化以降低成本并提高安全性测试的有效性。不幸的是,要实现这种自动化,除了自动得出测试输入的策略外,我们还需要解决甲骨文问题,这是指挑战,给定一个系统的输入,以区分正确的行为。在本文中,我们提出了Web Itchactions(MST-WI)的变质性安全测试,这是一种变质测试方法,该方法集成了受突变模糊启发的输入生成策略,并减轻了安全测试中的Oracle问题。它使工程师能够指定捕获Web系统许多安全属性的变质关系(MRS)。为了促进此类MRS的规格,我们提供了特定于域的语言,并由Eclipse编辑器伴随着。 MST-WI自动收集输入数据,并将MRS转换为可执行的Java代码以自动执行安全测试。它会自动测试Web系统以根据关系和收集数据检测漏洞。我们提供了76个系统不可能的MRS目录,以在Web系统中自动化安全测试。它涵盖了39%的OWASP安全测试活动未由最先进的技术自动化;此外,我们的MRS可以自动发现102种不同类型的漏洞,根据MITER CWE数据库违反了安全设计原则,这对应于45%的漏洞。我们还定义了指南,以使测试工程师能够相对于我们的方法提高正在测试的系统的可检验性。
Security testing aims at verifying that the software meets its security properties. In modern Web systems, however, this often entails the verification of the outputs generated when exercising the system with a very large set of inputs. Full automation is thus required to lower costs and increase the effectiveness of security testing. Unfortunately, to achieve such automation, in addition to strategies for automatically deriving test inputs, we need to address the oracle problem, which refers to the challenge, given an input for a system, of distinguishing correct from incorrect behavior. In this paper, we propose Metamorphic Security Testing for Web-interactions (MST-wi), a metamorphic testing approach that integrates test input generation strategies inspired by mutational fuzzing and alleviates the oracle problem in security testing. It enables engineers to specify metamorphic relations (MRs) that capture many security properties of Web systems. To facilitate the specification of such MRs, we provide a domain-specific language accompanied by an Eclipse editor. MST-wi automatically collects the input data and transforms the MRs into executable Java code to automatically perform security testing. It automatically tests Web systems to detect vulnerabilities based on the relations and collected data. We provide a catalog of 76 system-agnostic MRs to automate security testing in Web systems. It covers 39% of the OWASP security testing activities not automated by state-of-the-art techniques; further, our MRs can automatically discover 102 different types of vulnerabilities, which correspond to 45% of the vulnerabilities due to violations of security design principles according to the MITRE CWE database. We also define guidelines that enable test engineers to improve the testability of the system under test with respect to our approach.