메뉴 건너뛰기




Volumn 12, Issue 6, 2015, Pages 688-707

Web Application Vulnerability Prediction Using Hybrid Program Analysis and Machine Learning

Author keywords

empirical study; input validation and sanitization; program analysis; security measures; Vulnerability prediction

Indexed keywords

CODES (SYMBOLS); ERRORS; FORECASTING; LEARNING ALGORITHMS; MACHINE LEARNING; NETWORK SECURITY; OPEN SOURCE SOFTWARE; SUPERVISED LEARNING;

EID: 84959283014     PISSN: 15455971     EISSN: 19410018     Source Type: Journal    
DOI: 10.1109/TDSC.2014.2373377     Document Type: Article
Times cited : (117)

References (51)
  • 2
    • 84880843062 scopus 로고    scopus 로고
    • Predicting SQL injection and cross site scripting vulnerabilities through mining input sanitization patterns
    • L. K. Shar and H. B. K. Tan, "Predicting SQL injection and cross site scripting vulnerabilities through mining input sanitization patterns," Inf. Softw. Technol., vol. 55, no. 10, pp. 1767-1780, 2013.
    • (2013) Inf. Softw. Technol. , vol.55 , Issue.10 , pp. 1767-1780
    • Shar, L.K.1    Tan, H.B.K.2
  • 3
    • 33751027156 scopus 로고    scopus 로고
    • Pixy: A static analysis tool for detecting web application vulnerabilities
    • N. Jovanovic, C. Kruegel, E. Kirda, "Pixy: A static analysis tool for detecting web application vulnerabilities," in Proc. IEEE Symp. Security Privacy, 2006, pp. 258-263.
    • (2006) Proc. IEEE Symp. Security Privacy , pp. 258-263
    • Jovanovic, N.1    Kruegel, C.2    Kirda, E.3
  • 4
    • 84910681237 scopus 로고    scopus 로고
    • Static detection of security vulnerabilities in scripting languages
    • Y. Xie and A. Aiken, "Static detection of security vulnerabilities in scripting languages," in Proc. USENIX Security Symp., 2006, pp. 179-192.
    • (2006) Proc. USENIX Security Symp. , pp. 179-192
    • Xie, Y.1    Aiken, A.2
  • 5
    • 35348898067 scopus 로고    scopus 로고
    • Mar. [Online]. Available:
    • (2012, Mar.). SourceForge. [Online]. Available: http://www.sourceforge. net
    • (2012) SourceForge
  • 7
    • 84959283724 scopus 로고    scopus 로고
    • [Online]. Availble:
    • PhpMiner [Online]. Availble: http://sharlwinkhin.com/phpminer.html, 2013.
    • (2013) Php Miner
  • 10
    • 84959256246 scopus 로고    scopus 로고
    • Mar. [Online]. Available:
    • (2012, Mar.). RSnake [Online]. Available: http://ha.ckers.org
    • (2012) Rsnake
  • 12
    • 0343280011 scopus 로고    scopus 로고
    • Exploring the relationships between design measures and software quality in object-oriented systems
    • L. C. Briand, J. Wust, J. W. Daly, D. V. Porter, "Exploring the relationships between design measures and software quality in object-oriented systems," J. Syst. Softw., vol. 51, no. 3, pp. 245-273, 2000.
    • (2000) J. Syst. Softw. , vol.51 , Issue.3 , pp. 245-273
    • Briand, L.C.1    Wust, J.2    Daly, J.W.3    Porter, D.V.4
  • 13
    • 71649110371 scopus 로고    scopus 로고
    • A systematic and comprehensive investigation of methods to build and evaluate fault prediction models
    • E. Arisholm, L. C. Briand, E. B. Johannessen, "A systematic and comprehensive investigation of methods to build and evaluate fault prediction models," J. Syst. Softw., vol. 83, no. 1, pp. 2-17, 2010.
    • (2010) J. Syst. Softw. , vol.83 , Issue.1 , pp. 2-17
    • Arisholm, E.1    Briand, L.C.2    Johannessen, E.B.3
  • 14
    • 49349089233 scopus 로고    scopus 로고
    • Benchmarking classification models for software defect prediction: A proposed framework and novel findings
    • Jul./Aug.
    • S. Lessmann, B. Baesens, C. Mues, S. Pietsch, "Benchmarking classification models for software defect prediction: a proposed framework and novel findings," IEEE Trans. Softw. Eng., vol. 34, no. 4, pp. 485-496, Jul./Aug. 2008.
    • (2008) IEEE Trans. Softw. Eng. , vol.34 , Issue.4 , pp. 485-496
    • Lessmann, S.1    Baesens, B.2    Mues, C.3    Pietsch, S.4
  • 15
    • 77956972220 scopus 로고    scopus 로고
    • Defect prediction from static code features: Current results, limitations, new approaches
    • T. Menzies, Z. Milton, B. Turhan, B. Cukic, Y. Jiang, A. Bener, "Defect prediction from static code features: current results, limitations, new approaches," Automated Softw. Eng., vol. 17, no. 4, pp. 375-407, 2010.
    • (2010) Automated Softw. Eng. , vol.17 , Issue.4 , pp. 375-407
    • Menzies, T.1    Milton, Z.2    Turhan, B.3    Cukic, B.4    Jiang, Y.5    Bener, A.6
  • 16
    • 84866920422 scopus 로고    scopus 로고
    • Predicting common web application vulnerabilities from input validation and sanitization code patterns
    • L. K. Shar and H. B. K. Tan, "Predicting common web application vulnerabilities from input validation and sanitization code patterns," in Proc. Int. Conf. Automated Softw. Eng., 2012, pp. 310-313.
    • (2012) Proc. Int. Conf. Automated Softw. Eng. , pp. 310-313
    • Shar, L.K.1    Tan, H.B.K.2
  • 20
    • 29644438050 scopus 로고    scopus 로고
    • Statistical comparisons of classifiers over multiple data sets
    • J. Dem-sar, "Statistical comparisons of classifiers over multiple data sets," J. Mach. Learning Res., vol. 7, pp. 1-30, 2006.
    • (2006) J. Mach. Learning Res. , vol.7 , pp. 1-30
    • Demsar, J.1
  • 22
    • 85084163766 scopus 로고    scopus 로고
    • Automatic generation of XSS and SQL injection attacks with goal-directed model checking
    • M. Martin and M. S. Lam, "Automatic generation of XSS and SQL injection attacks with goal-directed model checking," in Proc. USENIX Security Symp., 2008, pp. 31-43.
    • (2008) Proc. USENIX Security Symp. , pp. 31-43
    • Martin, M.1    Lam, M.S.2
  • 23
    • 83555172467 scopus 로고    scopus 로고
    • Evaluating complexity, code churn, developer activity metrics as indicators of software vulnerabilities
    • Nov./Dec.
    • Y. Shin, A. Meneely, L. Williams, J. A. Osborne, "Evaluating complexity, code churn, developer activity metrics as indicators of software vulnerabilities," IEEE Trans. Softw. Eng., vol. 37, no. 6, pp. 772-787, Nov./Dec. 2011.
    • (2011) IEEE Trans. Softw. Eng. , vol.37 , Issue.6 , pp. 772-787
    • Shin, Y.1    Meneely, A.2    Williams, L.3    Osborne, J.A.4
  • 25
    • 34547700305 scopus 로고    scopus 로고
    • Using historical in-process and product metrics for early estimation of software failures
    • N. Nagappan, T. Ball, B. Murphy, "Using historical in-process and product metrics for early estimation of software failures," in Proc. Int. Symp. Softw. Rel. Eng., 2006, pp. 62-74.
    • (2006) Proc. Int. Symp. Softw. Rel. Eng. , pp. 62-74
    • Nagappan, N.1    Ball, T.2    Murphy, B.3
  • 27
    • 79952423152 scopus 로고    scopus 로고
    • A string constraint solver for detecting web application vulnerability
    • X. Fu and C.-C. Li, "A string constraint solver for detecting web application vulnerability," in Proc. Int. Conf. Softw. Eng. Knowl. Eng., 2010, pp. 535-542.
    • (2010) Proc. Int. Conf. Softw. Eng. Knowl. Eng. , pp. 535-542
    • Fu, X.1    Li, C.-C.2
  • 29
    • 84855479474 scopus 로고    scopus 로고
    • Automated removal of cross site scripting vulnerabilities in web applications
    • L. K. Shar and H. B. K. Tan, "Automated removal of cross site scripting vulnerabilities in web applications," Inf. Softw. Technol., vol. 54, no. 5, pp. 467-478, 2012.
    • (2012) Inf. Softw. Technol. , vol.54 , Issue.5 , pp. 467-478
    • Shar, L.K.1    Tan, H.B.K.2
  • 33
    • 84886430853 scopus 로고    scopus 로고
    • Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis
    • L. K. Shar, H. B. K. Tan, L. C. Briand, "Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis," in Proc. Int. Conf. Softw. Eng., 2013, pp. 642-651.
    • (2013) Proc. Int. Conf. Softw. Eng. , pp. 642-651
    • Shar, L.K.1    Tan, H.B.K.2    Briand, L.C.3
  • 34
    • 33845782503 scopus 로고    scopus 로고
    • Data mining static code attributes to learn defect predictors
    • Jan.
    • T. Menzies, J. Greenwald, A. Frank, "Data mining static code attributes to learn defect predictors," IEEE Trans. Softw. Eng., vol. 33, no. 1, pp. 2-13, Jan. 2007.
    • (2007) IEEE Trans. Softw. Eng. , vol.33 , Issue.1 , pp. 2-13
    • Menzies, T.1    Greenwald, J.2    Frank, A.3
  • 35
    • 79957799751 scopus 로고    scopus 로고
    • A general software defect-proneness prediction framework
    • May/Jun.
    • Q. Song, Z. Jia, M. Shepperd, S. Ying, J. Liu, "A general software defect-proneness prediction framework," IEEE Trans. Softw. Eng., vol. 37, no. 3, pp. 356-370, May/Jun. 2011.
    • (2011) IEEE Trans. Softw. Eng. , vol.37 , Issue.3 , pp. 356-370
    • Song, Q.1    Jia, Z.2    Shepperd, M.3    Ying, S.4    Liu, J.5
  • 37
    • 0035478854 scopus 로고    scopus 로고
    • Random forests
    • L. Breiman, "Random forests," Mach. Learning, vol. 45, no. 1, pp. 5-32, 2001.
    • (2001) Mach. Learning , vol.45 , Issue.1 , pp. 5-32
    • Breiman, L.1
  • 40
    • 84856674640 scopus 로고    scopus 로고
    • Sample-based software defect prediction with active and semi-supervised learning
    • M. Li, H. Zhang, R. Wu, Z.-H. Zhou, "Sample-based software defect prediction with active and semi-supervised learning," Automated Softw. Eng., vol. 19, pp. 201-230, 2012.
    • (2012) Automated Softw. Eng. , vol.19 , pp. 201-230
    • Li, M.1    Zhang, H.2    Wu, R.3    Zhou, Z.-H.4
  • 41
    • 84866952457 scopus 로고    scopus 로고
    • Software defect prediction using semi-supervised learning with dimension reduction
    • H. Lu, B. Cukic, M. Culp, "Software defect prediction using semi-supervised learning with dimension reduction," in Proc. Int. Conf. Automated Softw. Eng., 2012, pp. 314-317.
    • (2012) Proc. Int. Conf. Automated Softw. Eng. , pp. 314-317
    • Lu, H.1    Cukic, B.2    Culp, M.3
  • 42
    • 36249007597 scopus 로고    scopus 로고
    • Improve computer-aided diagnosis with machine learning techniques using undiagnosed samples
    • Nov.
    • M. Li and Z.-H. Zhou, "Improve computer-aided diagnosis with machine learning techniques using undiagnosed samples," IEEE Trans. Syst., Man Cyberne., Part A: Syst. Humans, vol. 37, no. 6, pp. 1088-1098, Nov. 2007.
    • (2007) IEEE Trans. Syst., Man Cyberne., Part A: Syst. Humans , vol.37 , Issue.6 , pp. 1088-1098
    • Li, M.1    Zhou, Z.-H.2
  • 44
    • 84959270456 scopus 로고    scopus 로고
    • Chord: A versatile platform for program analysis
    • [Online]. Available:
    • Chord: A versatile platform for program analysis. (2011). Proc. Tutorial ACM Conf. Program. Language Des. Implementation [Online]. Available: http://pag.gatech.edu/chord
    • (2011) Proc. Tutorial ACM Conf. Program. Language Des. Implementation
  • 47
    • 84959304761 scopus 로고    scopus 로고
    • [Online]. Available:
    • PHP Security [Online]. Available: http://www.php.net/manual/en/security.php, 2013.
    • (2013) PHP Security
  • 48
    • 56349089205 scopus 로고    scopus 로고
    • ADASYN: Adaptive synthetic sampling approach for imbalanced learning
    • H. He, Y. Bai, E. A. Garcia, S. Li, "ADASYN: Adaptive synthetic sampling approach for imbalanced learning," in Proc. Int. Joint Conf. Neural Netw., 2008, pp. 1322-1328.
    • (2008) Proc. Int. Joint Conf. Neural Netw. , pp. 1322-1328
    • He, H.1    Bai, Y.2    Garcia, E.A.3    Li, S.4
  • 49
    • 68549133155 scopus 로고    scopus 로고
    • Learning from imbalanced data
    • Sep.
    • H. He and E. A. Garcia, "Learning from imbalanced data," IEEE Trans. Knowl. Data Eng., vol. 21, no. 9, pp. 1263-1284, Sep. 2009.
    • (2009) IEEE Trans. Knowl. Data Eng. , vol.21 , Issue.9 , pp. 1263-1284
    • He, H.1    Garcia, E.A.2
  • 51
    • 84959297476 scopus 로고    scopus 로고
    • [Online]. Available:
    • PHP Top 5 [Online]. Available: https://www.owasp.org/index. php/PHP-Top-5, 2014.
    • (2014) PHP Top 5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.