Java vs. PHP: Security Implications of Language Choice for Web Applications
|
|
|
- Herbert Chase
- 10 years ago
- Views:
Transcription
1 Java vs. PHP: Security Implications of Language Choice for Web Applications James Walden, Maureen Doyle, Robert Lenhof, and John Murray Department of Computer Science Northern Kentucky University Highland Heights, KY Abstract. While Java and PHP are two of the most popular languages for open source web applications found at freshmeat.net, Java has had a much better security reputation than PHP. In this paper, we examine whether that reputation is deserved. We studied whether the variation in vulnerability density is greater between languages or between different applications written in a single language by comparing eleven open source web applications written in Java with fourteen such applications written in PHP. To compare the languages, we created a Common Vulnerability Metric (CVM), which is the count of four vulnerability types common to both languages. Common Vulnerability Density (CVD) is CVM normalized by code size. We measured CVD for two revisions of each project, one from 2006 and the other from CVD values were higher for the aggregate PHP code base than the Java code base, but PHP had a better rate of improvement, with a decline from 6.25 to 2.36 vulnerabilities/kloc compared to 1.15 to 0.63 in Java. These changes arose from an increase in code size in both languages and a decrease in vulnerabilities in PHP. The variation between projects was greater than the variation between languages, ranging from 0.52 to for Java and 0.03 to in PHP for We used security and software metrics to examine the sources of difference between projects. Key words: web application security, security metrics, open source 1 Introduction While Java and PHP are two of the most popular languages for open source web applications found at Freshmeat [6], they have quite different security reputations. In this paper, we examine whether the variation in vulnerability density is greater between languages or between different applications written in a single language. We compare eleven open source web applications written in Java with fourteen such applications written in PHP. We also analyzed the source code of two different revisions of each of these applications to track the evolution of vulnerability density over time. PHP applications included both PHP 4 and PHP 5 code. The Java applications were compiled with Sun Java SE 6, but the 2006 versions of some applications had to be compiled with Sun Java SE 5.
2 Despite differences in security reputations, more than twice as many open source web applications are written in PHP than Java, and twelve of the fourteen PHP applications studied are more popular than any of the Java applications [6]. In part, PHP s poor security reputation [9] arises from default language features enabled in earlier versions of the language. However, these features have gradually been turned off as defaults or removed from the language. For example, the register globals feature which automatically created program variables from HTTP parameters was turned off as default in PHP 4.2 and removed in PHP 6. We measured security through the number of vulnerabilities of types common to both languages as reported by a static analysis tool. Static analysis tools find common secure programming errors by evaluating source code without executing it. Static analysis has the advantage of being repeatable and checking all parts of the code equally, unlike human code reviewers or vulnerability researchers. The objective nature of static analysis makes it suitable for comparing different code bases, though, like human reviewers, static analysis tools make mistakes at times. We computed code size and complexity metrics and also a security resources indicator metric [15] to examine the source of differences between projects. We discuss related work in section 2 and study design in section 3. Overall results are described in section 4, with section 5 analyzing results by vulnerability type. Sections 6 and 7 examine software and security metrics to determine the causes of differences between applications. Limitations of our analysis are discussed in section 8. Section 9 finishes the paper, giving conclusions and describing future work. 2 Related Work Coverity used their Prevent static analysis tool to analyze a large number of open source projects written in C and C++ [3], using the static analysis vulnerability density metric. Fortify analyzed a small number of Java projects [5] with their static analysis tool, using the same metric. Nagappan used static analysis tools to measure defect density [8] to predict post-release defects. Note that defect density may not correlate with vulnerability density, as security flaws differ from reliability flaws. Ozment and Schechter [12] and Li et. al. [7] studied how the number of security issues evolves over time. Ozment found a decrease in OpenBSD, while Li found an increase in both Mozilla and Apache. Shin [14] and Nagappan et. al. [10] analyzed correlations of cyclomatic complexity with vulnerabilities. They had mixed results, with Shin finding a weak correlation for Mozilla and Nagappan finding three projects out of five having strong correlations. Shin also analyzed nesting complexity, finding significant but weak correlations with vulnerabilities for Mozilla. Neuhaus and Zimmerman [11] studied the effect of dependencies on vulnerabilities in several thousand Red Hat Linux packages. Zimmerman et. al. [16] analyzed the problem of predicting defects based on information from other
3 projects, finding that only 3.4% of cross-project predictions were both significant and had strong correlation coefficients. 3 Study Design We examined the project history of 25 open source web applications, eleven of which were written in Java, fourteen of which were written in PHP. The applications are listed in table 1. Table 1. Open Source Web Applications Java PHP alfresco contelligent daisywiki achievo obm roundcube dspace jackrabbit jamwiki dotproject phpbb smarty lenya ofbiz velocity gallery2 phpmyadmin squirrelmail vexi xwiki mantisbt phpwebsite wordpress mediawiki po To be selected, an application had to have a source code repository with revisions ranging from July 2006 to July The selected applications were the only applications that had revisions from those periods that could be built from source code in their repositories. While most third-party PHP libraries can be found in the PEAR or PECL repositories, third-party Java libraries are scattered among a variety of sites. Java developers often use tools like Maven to retrieve third-party software and manage builds. Eight Java applications were not included in the study because they could not be built due to missing third-party software. Some older revisions used repositories of third-party tools that no longer existed, in which case we modified the Maven configuration to point to current repositories. This approach succeeded in some cases, but failed in others, as current Maven repositories do not contain every software version needed by older revisions. Some projects used other techniques to fetch dependencies, including ivy and custom build scripts. Only five of the PHP projects and none of the Java projects maintained a public vulnerability database or had a security category in its bug tracker. While there were 494 Common Vulnerabilities and Exposures (CVE) listings for the PHP projects, there were only six such listings for the Java projects. The number of CVE entries does not necessarily indicate that a project is more or less secure. Due to the sparse and uneven nature of this data, documented vulnerabilities could not be used to measure the security of these applications. Instead, we used static analysis to find vulnerabilities in the source code of these applications. We used Code Analyzer to compute SLOC, cyclomatic complexity, and nesting complexity for Java, and SLOCCount and Code Sniffer for PHP. We used Fortify Source Code Analyzer version 5.6 for static analysis. While there is no release quality free PHP static analysis tool, two of the Java web applications used
4 the free FindBugs [1] static analysis tool. No web application showed evidence of use of a commercial static analysis tool in the form of files in the repository (which is how we identified use of FindBugs) or web site documentation. Vulnerability density can be measured using the static analysis vulnerability density (SAVD) metric [15], which normalizes vulnerability counts by KSLOC (thousand source lines of code.) However, Fortify finds 30 types of vulnerabilities for Java and only 13 types for PHP in our set of applications, which prevents SAVD from being compared directly between the two languages. Since only four vulnerability types are shared between the two groups of applications we studied, we created a common vulnerability metric (CVM), which is the sum of those four vulnerability types, to more accurately compare results between Java and PHP. Common vulnerability density (CVD) is CVM normalized by KSLOC. The four common vulnerability types were cross-site scripting, SQL injection, path manipulation, and code injection. Three of the four types are in the top five application vulnerabilities reported by MITRE in 2007 [2]. The two missing types from MITRE s top five are PHP remote file inclusion, which is found only in PHP, and buffer overflows, which are found in neither language. 4 Results Examining the aggregate code base of the fourteen PHP applications, we found that common vulnerability density declined from 6.25 vulnerabilities/ksloc in 2006 to 2.36 in 2008, a decrease of 62.24%. Over the same period, CVD declined from 1.15 in to 0.63 in the eleven Java applications, a decrease of 45.2%. Common vulnerabilities in PHP declined from 5425 to 3318, while common vulnerabilities increased from 5801 to 7045 in Java. The decrease in density for Java is the result of a tremendous increase in code size, from 5 million to 11 million SLOC. The expansion of the PHP code base was much smaller, from 870,000 to 1.4 million SLOC. Java projects were larger on average than PHP projects. While one Java project, xwiki, had over a million of lines of code, the other ten Java projects ranged from 30,000 to 500,000 lines. The largest PHP project had 388,000 lines, and the smallest had under 6,000 lines, with the other twelve ranging from 25,000 to 150,000 lines. This difference tends to support the contention that PHP requires fewer lines of code to implement functionality than Java, especially as projects implementing the same type of software, such as wikis, were smaller in PHP than Java. If we compare all vulnerability types, including all 30 categories of Java vulnerabilities and 13 categories of PHP vulnerabilities, we find that the vulnerability density of the Java code base decreased from 5.87 to 3.85, and PHP decreased from 8.86 to 6.02 from 2006 to The total number of PHP vulnerabilities increased from 7730 to 8459, while the total number of Java vulnerabilities increased from 29,473 to 42,581. CVD varied much more between projects than between languages. In 2006, PHP projects ranged from 0.03 to vulnerabilities/kloc while Java projects
5 had a much smaller range from 0.52 to In 2008, both ranges shrank, with PHP projects varying from 0.03 to and Java projects ranging from 0.04 to Photo Organizer (po) had the highest CVD for both years. Figures 1 and 2 show change in vulnerability density between the initial and final revision for each project. In sections 6 and 7, we examine some possible sources of these differences between projects. Fig. 1. Change in CVD for Java Fig. 2. Change in CVD for PHP 5 Vulnerability Type Analysis In this section, we examine the four vulnerability types that make up the CVM: cross-site scripting, SQL injection, path manipulation, and command injection. Figure 3 shows the changes in each vulnerability type between 2006 and 2008 for the aggregate Java and PHP code bases. The number of vulnerabilities in all four categories increased for Java, while they decreased for PHP. Individual projects did not follow these overall patterns; two Java projects, contelligent and jamwiki, had reductions in three of the four categories. No Java project reduced the number of command injections. Two projects, alfresco and jackrabbit, did not reduce the number of vulnerabilities in any category. Despite the overall decrease for PHP, nine of the fourteen PHP applications increased CVD. Two projects showed small decreases, while the remaining three contributed the bulk of the vulnerability reductions: photo organizer, squirrelmail, and wordpress. Photo organizer is the only PHP project that saw a reduction in all four error types. Eight of the remaining PHP projects increased cross-site scripting errors, and nine increased path manipulation errors. We also examined the contribution of each vulnerability type to the overall CVM and how that changed over the two years. Figure 4 compares the percentage contribution of each of the four vulnerabilities to the total CVM for Java and PHP projects in 2006 and 2008.
6 Fig. 3. Type Contribution to CVM Fig. 4. Type Changes: The 2008 ranking of the contributions of each error type for both languages and both years are the same: cross-site scripting, followed by path manipulation, SQL injection, and Command Injection. The total number of command injections is tiny compared to the other three types, which are found in MITRE s top five. The majority of the PHP change resulted from removing SQL injection flaws. Cross-site scripting vulnerabilities showed the largest decrease in Java, though the change was not as dramatic as the SQL injection reduction in PHP. 6 Software Metric Analysis Based on prior work and research [3, 8, 10, 12, 13, 15], we selected software metrics which had demonstrated correlations to vulnerability or defect density: cyclomatic complexity (CC) and nesting complexity. We used the same metric definitions as in [15], including three variants of each complexity metric: average, total, and maximum. Average is computed per-function for PHP and per-class for Java. While PHP 5 supports classes, these applications organized their code primarily with functions. Figure 5 displays the correlations of metrics to CVD for both revisions. Correlation was computed using the Spearman rank correlation coefficient (ρ) since no assumptions can be made about the underlying distributions. Significant correlations were found for maximum cyclomatic complexity and nesting complexity with change in CVD over the two year period (p = 0.02) for Java projects, but no correlations are signficant for the remaining metrics. While total code complexity is an indicator of changes in vulnerability density for Java projects, there are no significant correlations between software metrics and CVD for PHP projects. We also compared change in metric values over the time period with change in CVD. We found only one signficant correlation; CVD is negatively correlated with SLOC for PHP projects. Since CVD decreased with time for this group of projects while SLOC increased, this result is not unexpected.
7 Fig. 5. Metric correlations to CVD Fig. 6. Metric correlations to CVD 7 Security Resource Indicator We measured the importance of security to a project by counting the public security resources made available on the project web site. We used the security resource indicator metric (SRI) [15], which is based on four items: security documentation for application installation and configuration, a dedicated alias to report security problems, a list of vulnerabilities specific to the application, and documentation of secure development practices, such as techniques to avoid common secure programming errors. The SRI metric is the sum of the four indicator items, ranging from zero to four. Six of the eleven Java projects had security documentation, but none of the projects had any of the other three indicators. These results are similar to the results of Fortify s survey [5], in which only one of the eleven projects they examined had a security alias and two had links to security information. Their survey did not include the other components of the SRI metric. PHP results were substantially different. While the percentage of projects with security documentation was lower, with only five of the fourteen projects having such documentation, six PHP projects had security contacts, five had vulnerability databases, and four had secure coding documentation. While there is no significant correlation of SRI with change in CVD, there is a significant correlation (p < 0.05) with a strong Spearman rank correlation coefficient, ρ, of 0.67, of SRI with change in SAVD, counting all PHP vulnerability categories. The difference in SRI may result from the differences in application popularity. Open source PHP web applications are much more widely used than open source Java web applications. Popular projects are more likely to have vulnerabilities listed in the National Vulnerability Database [15], and therefore have a stronger incentive to track vulnerabilities and provide security contacts. In addition to the greater number and higher Freshmeat popularity of PHP applications, language popularity is also revealed in what languages are supported by web hosting providers. Sixteen of the top 25 web hosting providers from webhosting.info listed supported languages: 87.5% supported PHP while only 25% supported Java. Several of the top hosting providers offered hosting
8 for popular PHP applications, including Drupal, Joomla, Mambo, phpbb, and WordPress. None provided hosting for specific Java web applications. 8 Analysis Limitations The 25 open source web applications were the only projects found on freshmeat. net that met our analysis criteria. Our analysis may not apply to other projects that were not analyzed in this work. Different static analysis tools look for different types of vulnerability and use different analysis techniques, so the vulnerability density from one tool cannot be compared directly to another. Static analysis tools also search for different vulnerabilities in different languages. Static analysis tools report false positives, where a program mistakenly identifies a line of code as containing a vulnerability that it does not. Walden et. al. [15] found that the Fortify static analysis tool had a false positive rate of 18.1% when examining web applications written in PHP. Coverity [3] found a false positive rate of less than 14% for millions of lines of C and C++ code. 9 Conclusion We found that Java web applications had a substantially lower CVD than similar applications written in PHP, with 2008 values of 2.36 vulnerabilities/ksloc for PHP and 0.63 for Java. Both sets of applications improved from 2006 to 2008, with PHP improving faster due to a decrease in vulnerability count while Java s improvement was due to a lower rate of vulnerabilities being inserted as code size grew. A large part of PHP s decrease was from a decline in SQL injection vulnerabilities, which could arise from higher usage of parameterized query interfaces as hosting providers offered newer versions of PHP database libraries. The variation between projects was much greater than the variation between languages, ranging from 0.52 to vulnerabilities/ksloc for Java and 0.03 to in PHP for Eight of the PHP projects had higher vulnerability densities in 2008 than 2006, while only three Java projects did. SRI was a useful predictor of how vulnerabilities evolved in PHP projects, but not for Java since none of the Java projects had security contacts or vulnerability listings. Complexity metrics were useful predictors for Java but not PHP vulnerability evolution. In summary, programming language is not an important consideration in developing secure open source web applications. The correlation coefficient, ρ = 0.07, between language and CVD, was quite low, but it was not statistically significant. However, neither language had a clear advantage over the other in CVD over time and the variation between applications was much larger than the variation between languages.
9 References 1. Ayewah, N., Pugh, W.J., Morgenthaler, D., Penix J., Zhou. Y.: Evaluating Static Analysis Defect Warnings On Production Software. In: The 7th ACM SIGPLAN- SIGSOFT Workshop on Program Analysis for Software Tools and Engineering, June Christey, S.M. and Martin, R.A.: index.html, published May 22, Coverity, Coverity Scan Open Source Report 2009, scan/, September 23, Fenton, N.E. and Pfleeger, S.L.: Software Metrics: A Rigorous and Practical Approach, Brooks/Cole, Massachusetts, Fortify Security Research Group and Larry Suto: Open Source Security Study. http: // July accessed September 27, Li, Z., Tan, L., Wang, Xuanhui and Lu, Shan and Zhou, Yuanyuan and Zhai, Chengxiang: Have things changed now?: an empirical study of bug characteristics in modern open source software. In: Proceedings of the 1st workshop on Architectural and system support for improving software dependability, Association of Computing Machinery, New York, 2006, pp Nagappan, N. and Ball, T: Static analysis tools as early indicators of pre-release defect density. In: Proceedings of the 27th International Conference on Software Engineering, Association of Computing Machinery, New York, 2005, pp Shiflett, C.: PHP Security Consortium Redux. feb/php-security-consortium-redux. 10. Nagappan, N., Ball, T., and Zeller, A.: Mining Metrics to Predict Component Failures. In: Proceedings of the 28th International Conference on Software Engineering, Association of Computing Machinery, New York, 2006, pp Neuhaus, S., and Zimmerman, T.: The Beauty and the Beast: Vulnerabilities in Red Hat s Packages. In: Proceedings of the 2009 USENIX Annual Technical Conference (USENIX 2009), San Diego, CA, USA, June Ozment, A. and Schechter, S.E.: Milk or Wine: Does Software Security Improve with Age?. In: Proceedings of the 15th USENIX Security Symposium, USENIX Association, California, 2006, pp Shin, Y. and Williams, L.: An Empirical Model to Predict Security Vulnerabilities using Code Complexity Metrics. In: Proceedings of the 2nd International Symposium on Empirical Software Engineering and Measurement, Association for Computing Machinery, New York, 2008, pp Shin, Y. and Williams, L: Is Complexity Really the Enemy of Software Security?. In: Quality of Protection Workshop at the ACM Conference on Computers and Communications Security (CCS) 2008, Association for Computing Machinery, New York, 2008, pp Walden, J., Doyle, M., Welch, G., Whelan, M.: Security of Open Source Web Applications. In: Proceedings of the International Workshop on Security Measurements and Metrics, IEEE, Zimmermann, T., Nagappan, N., Gall, H., Giger, E., Murphy, B.: Cross-project Defect Prediction. In: Proceedings of the 7th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE 2009), Amsterdam, The Netherlands, August 2009.
Idea: Measuring the Effect of Code Complexity on Static Analysis Results
Idea: Measuring the Effect of Code Complexity on Static Analysis Results James Walden, Adam Messer, and Alex Kuhl Department of Computer Science Northern Kentucky University Highland Heights, KY 41099
Measuring the Effect of Code Complexity on Static Analysis Results
Measuring the Effect of Code Complexity on Static Analysis Results James Walden, Adam Messer, and Alex Kuhl Department of Computer Science Northern Kentucky University Highland Heights, KY 41099 Abstract.
Impact of Plugins on Web Application Security OWASP. The OWASP Foundation http://www.owasp.org
Impact of Plugins on Web Application Security Cincinnati Chapter Meeting June 29 th, 2010 James Walden and Maureen Doyle Northern Kentucky University Copyright The Foundation Permission is granted to copy,
Java vs PHP: A Security Approach
Date of acceptance Grade Instructor Java vs PHP: A Security Approach Anttijuhani Lantto Helsinki March 4, 2011 UNIVERSITY OF HELSINKI Department of Computer Science HELSINGIN YLIOPISTO HELSINGFORS UNIVERSITET
Mining Metrics to Predict Component Failures
Mining Metrics to Predict Component Failures Nachiappan Nagappan, Microsoft Research Thomas Ball, Microsoft Research Andreas Zeller, Saarland University Overview Introduction Hypothesis and high level
Application Code Development Standards
Application Code Development Standards Overview This document is intended to provide guidance to campus system owners and software developers regarding secure software engineering practices. These standards
Securing PHP Based Web Application Using Vulnerability Injection
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 5 (2013), pp. 391-398 International Research Publications House http://www. irphouse.com /ijict.htm Securing
Web Application Report
Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012
A Test Suite for Basic CWE Effectiveness. Paul E. Black. [email protected]. http://samate.nist.gov/
A Test Suite for Basic CWE Effectiveness Paul E. Black [email protected] http://samate.nist.gov/ Static Analysis Tool Exposition (SATE V) News l We choose test cases by end of May l Tool output uploaded
Security Vulnerabilities in Open Source Java Libraries. Patrycja Wegrzynowicz CTO, Yonita, Inc.
Security Vulnerabilities in Open Source Java Libraries Patrycja Wegrzynowicz CTO, Yonita, Inc. About Me Programmer at heart Researcher in mind Speaker with passion Entrepreneur by need @yonlabs Agenda
Integrigy Corporate Overview
mission critical applications mission critical security Application and Database Security Auditing, Vulnerability Assessment, and Compliance Integrigy Corporate Overview Integrigy Overview Integrigy Corporation
Analysis of Open Source Software Development Iterations by Means of Burst Detection Techniques
Analysis of Open Source Software Development Iterations by Means of Burst Detection Techniques Bruno Rossi, Barbara Russo, and Giancarlo Succi CASE Center for Applied Software Engineering Free University
Source Code Review Using Static Analysis Tools
Source Code Review Using Static Analysis Tools July-August 05 Author: Stavros Moiras Supervisor(s): Stefan Lüders Aimilios Tsouvelekakis CERN openlab Summer Student Report 05 Abstract Many teams at CERN,
Defect Prediction Leads to High Quality Product
Journal of Software Engineering and Applications, 2011, 4, 639-645 doi:10.4236/jsea.2011.411075 Published Online November 2011 (http://www.scirp.org/journal/jsea) 639 Naheed Azeem, Shazia Usmani Department
Secure in 2010? Broken in 2011!
Secure in 2010? Broken in 2011! Matias Madou Principal Security Researcher Abstract In 2010, a security research firm stumbled on a couple of vulnerabilities in Apache OFBiz, a widely used open source
Threat Modeling. Deepak Manohar
Threat Modeling Deepak Manohar Outline Motivation Past Security Approaches Common problems with past security approaches Adversary s perspective Vs Defender s perspective Why defender s perspective? Threat
<Insert Picture Here> What's New in NetBeans IDE 7.2
Slide 1 What's New in NetBeans IDE 7.2 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated
Software security specification and verification
Software security specification and verification Erik Poll Security of Systems (SoS) group Radboud University Nijmegen Software (in)security specification and verification/detection Erik Poll Security
Integrating Web Application Security into the IT Curriculum
Integrating Web Application Security into the IT Curriculum James Walden Northern Kentucky University Topics 1. 2. 3. 4. Why should we teach web application security? What material do we need to cover?
WEB APPLICATION VULNERABILITY STATISTICS (2013)
WEB APPLICATION VULNERABILITY STATISTICS (2013) Page 1 CONTENTS Contents 2 1. Introduction 3 2. Research Methodology 4 3. Summary 5 4. Participant Portrait 6 5. Vulnerability Statistics 7 5.1. The most
Open Source Security Study How Are Open Source Development Communities Embracing Security Best Practices?
Open Source Security Study How Are Open Source Development Communities Embracing Security Best Practices? Fortify s Security Research Group and Larry Suto July 2008 Open Source Security Study WWW.FORTIFY.COM
Finding Execution Faults in Dynamic Web Application
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 445-452 International Research Publications House http://www. irphouse.com /ijict.htm Finding
Braindumps.C2150-810.50 questions
Braindumps.C2150-810.50 questions Number: C2150-810 Passing Score: 800 Time Limit: 120 min File Version: 5.3 http://www.gratisexam.com/ -810 IBM Security AppScan Source Edition Implementation This is the
Protecting Database Centric Web Services against SQL/XPath Injection Attacks
Protecting Database Centric Web Services against SQL/XPath Injection Attacks Nuno Laranjeiro, Marco Vieira, and Henrique Madeira CISUC, Department of Informatics Engineering University of Coimbra, Portugal
Linux Kernel. Security Report
Linux Kernel Security Report September 25 Authors: Andy Chou, Bryan Fulton and Seth Hallem Coverity has combined two years of analysis work carried out in a commercial setting at Coverity with four years
Interactive Application Security Testing (IAST)
WHITEPAPER Interactive Application Security Testing (IAST) The World s Fastest Application Security Software Software affects virtually every aspect of an individual s finances, safety, government, communication,
State of The Art: Automated Black Box Web Application Vulnerability Testing. Jason Bau, Elie Bursztein, Divij Gupta, John Mitchell
Stanford Computer Security Lab State of The Art: Automated Black Box Web Application Vulnerability Testing, Elie Bursztein, Divij Gupta, John Mitchell Background Web Application Vulnerability Protection
Applying Software Quality Models to Software Security
Applying Software Quality Models to Software Security Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Carol Woody, Ph.D. April 21, 2015 Copyright 2015 Carnegie Mellon University
EXTENDED ANGEL: KNOWLEDGE-BASED APPROACH FOR LOC AND EFFORT ESTIMATION FOR MULTIMEDIA PROJECTS IN MEDICAL DOMAIN
EXTENDED ANGEL: KNOWLEDGE-BASED APPROACH FOR LOC AND EFFORT ESTIMATION FOR MULTIMEDIA PROJECTS IN MEDICAL DOMAIN Sridhar S Associate Professor, Department of Information Science and Technology, Anna University,
Web Application Security
Web Application Security Richard A. Kemmerer Reliable Software Group Computer Science Department University of California Santa Barbara, CA 93106, USA http://www.cs.ucsb.edu/~rsg www.cs.ucsb.edu/~rsg/
Open Source Content Management System for content development: a comparative study
Open Source Content Management System for content development: a comparative study D. P. Tripathi Assistant Librarian Biju Patnaik Central Library NIT Rourkela [email protected] Designing dynamic and
Predicting Vulnerable Software Components via Text Mining
1 Predicting Vulnerable Software Components via Text Mining Riccardo Scandariato, James Walden, Aram Hovsepyan and Wouter Joosen Abstract This paper presents an approach based on machine learning to predict
SERG. Tracking Known Security Vulnerabilities in Proprietary Software Systems
Delft University of Technology Software Engineering Research Group Technical Report Series Tracking Known Security Vulnerabilities in Proprietary Software Systems Mircea Cadariu, Eric Bouwers, Joost Visser,
WhiteHat Security White Paper. Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program
WhiteHat Security White Paper Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program October 2015 The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Zoomer: An Automated Web Application Change Localization Tool
Journal of Communication and Computer 9 (2012) 913-919 D DAVID PUBLISHING Zoomer: An Automated Web Application Change Localization Tool Wenhua Wang 1 and Yu Lei 2 1. Marin Software Company, San Francisco,
Evaluation of Web Security Mechanisms Using Inline Scenario & Online Scenario
Evaluation of Web Security Mechanisms Using Inline Scenario & Online Scenario M. Durai Ganesh (Research Scholars) Information Technology, St. Peter s University, Chennai- 54, Tamil Nadu, India Dr. G.Gunasekaran,
The Evolution of Mobile Apps: An Exploratory Study
The Evolution of Mobile Apps: An Exploratory Study Jack Zhang, Shikhar Sagar, and Emad Shihab Rochester Institute of Technology Department of Software Engineering Rochester, New York, USA, 14623 {jxz8072,
Web application security: automated scanning versus manual penetration testing.
Web application security White paper January 2008 Web application security: automated scanning versus manual penetration testing. Danny Allan, strategic research analyst, IBM Software Group Page 2 Contents
Project Knowledge Management Based on Social Networks
DOI: 10.7763/IPEDR. 2014. V70. 10 Project Knowledge Management Based on Social Networks Panos Fitsilis 1+, Vassilis Gerogiannis 1, and Leonidas Anthopoulos 1 1 Business Administration Dep., Technological
LAMP [Linux. Apache. MySQL. PHP] Industrial Implementations Module Description
LAMP [Linux. Apache. MySQL. PHP] Industrial Implementations Module Description Mastering LINUX Vikas Debnath Linux Administrator, Red Hat Professional Instructor : Vikas Debnath Contact
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4 Gordon MacKay Digital Defense, Inc. Chris Wysopal Veracode Session ID: Session Classification: ASEC-W25 Intermediate AGENDA Risk Management Challenges
Comparing Methods to Identify Defect Reports in a Change Management Database
Comparing Methods to Identify Defect Reports in a Change Management Database Elaine J. Weyuker, Thomas J. Ostrand AT&T Labs - Research 180 Park Avenue Florham Park, NJ 07932 (weyuker,ostrand)@research.att.com
Intro to Patching. Thomas Cameron, Chief Architect, Western US, Red Hat [email protected] twitter: thomasdcameron IRC: choirboy on Freenode
Intro to Patching Thomas Cameron, Chief Architect, Western US, Red Hat [email protected] twitter: thomasdcameron IRC: choirboy on Freenode RHCA, RHCSS, RHCDS, RHCVA, RHCX Agenda 2 Who am I? Who are you?
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
CentOS Linux 5.2 and Apache 2.2 vs. Microsoft Windows Web Server 2008 and IIS 7.0 when Serving Static and PHP Content
Advances in Networks, Computing and Communications 6 92 CentOS Linux 5.2 and Apache 2.2 vs. Microsoft Windows Web Server 2008 and IIS 7.0 when Serving Static and PHP Content Abstract D.J.Moore and P.S.Dowland
Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
CSUSB Web Application Security Standard CSUSB, Information Security & Emerging Technologies Office
CSUSB, Information Security & Emerging Technologies Office Last Revised: 03/17/2015 Draft REVISION CONTROL Document Title: Author: File Reference: CSUSB Web Application Security Standard Javier Torner
Webapps Vulnerability Report
Tuesday, May 1, 2012 Webapps Vulnerability Report Introduction This report provides detailed information of every vulnerability that was found and successfully exploited by CORE Impact Professional during
Do Programming Languages Affect Productivity? A Case Study Using Data from Open Source Projects
Do Programming Languages Affect Productivity? A Case Study Using Data from Open Source Projects Daniel P. Delorey [email protected] Charles D. Knutson [email protected] Scott Chun [email protected] Abstract
Streamlining Application Vulnerability Management: Communication Between Development and Security Teams
Streamlining Application Vulnerability Management: Communication Between Development and Security Teams October 13, 2012 OWASP Boston Application Security Conference Agenda Introduction / Background Vulnerabilities
Content. Development Tools 2(63)
Development Tools Content Project management and build, Maven Version control, Git Code coverage, JaCoCo Profiling, NetBeans Static Analyzer, NetBeans Continuous integration, Hudson Development Tools 2(63)
Secure in 2010? Broken in 2011! Matias Madou, PhD Principal Security Researcher
Secure in 2010? Broken in 2011! Matias Madou, PhD Principal Security Researcher Matias Madou Principal Security Researcher, Fortify an HP Company Static Analysis Rules Insider Threat Research Runtime products:
1000 Projects later. Security Code Scans at SAP
1000 Projects later Security Code Scans at SAP About Us Ruediger Bachmann is a Development Architect at SAP AG working, as member of the central code analyses team, in the areas application security and
Toward A Taxonomy of Techniques to Detect Cross-site Scripting and SQL Injection Vulnerabilities
NCSU CSC TR 2008-4 1 Toward A Taxonomy of Techniques to Detect Cross-site Scripting and SQL Injection Vulnerabilities Yonghee SHIN, Laurie WILLIAMS, Members, IEEE Abstract Since 2002, over half of reported
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
Introduction: 1. Daily 360 Website Scanning for Malware
Introduction: SiteLock scans your website to find and fix any existing malware and vulnerabilities followed by using the protective TrueShield firewall to keep the harmful traffic away for good. Moreover
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
CS 558 Internet Systems and Technologies
CS 558 Internet Systems and Technologies Dimitris Deyannis [email protected] 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.
Linux versus Windows Hosting Plus complete list of features from CompuTech
Linux versus Windows Hosting Plus complete list of features from CompuTech Most hosting companies, including CompuTech Computing, will offer you hosting for your website on servers that are running either
Got Issues? Do New Features and Code Improvements Affect Defects?
Got Issues? Do New Features and Code Improvements Affect Defects? Daryl Posnett [email protected] Abram Hindle [email protected] Prem Devanbu [email protected] Abstract There is a perception
Rise of the Machines: An Internet-Wide Analysis of Web Bots in 2014
SESSION ID: SPO2-W04 Rise of the Machines: An Internet-Wide Analysis of Web Bots in 2014 John Summers VP, Security Products Akamai #RSAC The Akamai Intelligent Platform The Platform 167,000+ Servers 2,300+
Using Static Code Analysis Tools for Detection of Security Vulnerabilities
Using Static Code Analysis Tools for Detection of Security Vulnerabilities Katerina Goseva-Popstajanova & Andrei Perhinschi Lane Deptartment of Computer Science and Electrical Engineering West Virginia
Security Assessment of Waratek AppSecurity for Java. Executive Summary
Security Assessment of Waratek AppSecurity for Java Executive Summary ExecutiveSummary Security Assessment of Waratek AppSecurity for Java! Introduction! Between September and November 2014 BCC Risk Advisory
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
Put a Firewall in Your JVM Securing Java Applications!
Put a Firewall in Your JVM Securing Java Applications! Prateep Bandharangshi" Waratek Director of Client Security Solutions" @prateep" Hussein Badakhchani" Deutsche Bank Ag London Vice President" @husseinb"
QRCloud: Android Vulnerability Query and Push Services Based on QR Code in Cloud Computing
Journal of Computational Information Systems 11: 11 (2015) 3875 3881 Available at http://www.jofcis.com QRCloud: Android Vulnerability Query and Push Services Based on QR Code in Cloud Computing Jingzheng
CDM Vulnerability Management (VUL) Capability
CDM Vulnerability Management (VUL) Capability Department of Homeland Security Office of Cybersecurity and Communications Federal Network Resilience Vulnerability Management Continuous Diagnostics and Mitigation
Coverity Scan. Big Data Spotlight
Coverity Scan Big Data Spotlight Coverity Scan Service The Coverity Scan service began as the largest public-private sector research project in the world focused on open source software quality and security.
OWASP Top Ten Tools and Tactics
OWASP Top Ten Tools and Tactics Russ McRee Copyright 2012 HolisticInfoSec.org SANSFIRE 2012 10 JULY Welcome Manager, Security Analytics for Microsoft Online Services Security & Compliance Writer (toolsmith),
SQL INJECTION MONITORING SECURITY VULNERABILITIES IN WEB APPLICATIONS
SQL INJECTION MONITORING SECURITY VULNERABILITIES IN WEB APPLICATIONS Manas Kumar 1, S. Senthil kumar 2 and D. Sarvanan 3 1 M.C.A. (Final Year) Abstract Sql injection: a recently discovered application
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
Software Code Quality Checking (SCQC) No Clearance for This Secret: Information Assurance is MORE Than Security
Software Code Quality Checking (SCQC) No Clearance for This Secret: Information Assurance is MORE Than Security Nominee International Security Executives (ISE ) Information Security Project of the Year
Malware Detection in Android by Network Traffic Analysis
Malware Detection in Android by Network Traffic Analysis Mehedee Zaman, Tazrian Siddiqui, Mohammad Rakib Amin and Md. Shohrab Hossain Department of Computer Science and Engineering, Bangladesh University
Security Certification of Third- Parties Applications
Security Certification of Third- Parties Applications Stanislav Dashevskyi [email protected] Advisors: Fabio Massacci, Antonino Sabetta Agenda Introduction Third-party code in web applications Third-party
How To Understand And Understand The Security Of A Web Browser (For Web Users)
Security vulnerabilities: should they be early detected? - [email protected] Alessandro Garcia [email protected] OPUS Research Group Agenda 1. Background; 2.Motivation; 3.Research Questions;
Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, 2014. Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661
Adobe ColdFusion Secure Profile Web Application Penetration Test July 31, 2014 Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661 Chicago Dallas This document contains and constitutes the
Processing and data collection of program structures in open source repositories
1 Processing and data collection of program structures in open source repositories JEAN PETRIĆ, TIHANA GALINAC GRBAC AND MARIO DUBRAVAC, University of Rijeka Software structure analysis with help of network
Securing Network Software using Static Analysis
Securing Network Software using Static Analysis Lauri Kolmonen Helsinki University of Technology [email protected] Abstract Writing network software is not easy and developing secure network software
How to Build a Trusted Application. John Dickson, CISSP
How to Build a Trusted Application John Dickson, CISSP Overview What is Application Security? Examples of Potential Vulnerabilities Strategies to Build Secure Apps Questions and Answers Denim Group, Ltd.
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
