Game-based detection method of broken access control vulnerabilities in Web application

To solve the problem that the access control strategy of the program in the industrial Internet was difficult to extract from the source code, and that the user’s access operation was difficult to trigger all access paths, which led to the difficulty of universal detection of logical vulnerabilities...

Full description

Saved in:
Bibliographic Details
Main Authors: HE Haitao, XU Ke, YANG Shuailin, ZHANG Bing, ZHAO Yuxuan, LI Jiazheng
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2024-06-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024078/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539231491555328
author HE Haitao
XU Ke
YANG Shuailin
ZHANG Bing
ZHAO Yuxuan
LI Jiazheng
author_facet HE Haitao
XU Ke
YANG Shuailin
ZHANG Bing
ZHAO Yuxuan
LI Jiazheng
author_sort HE Haitao
collection DOAJ
description To solve the problem that the access control strategy of the program in the industrial Internet was difficult to extract from the source code, and that the user’s access operation was difficult to trigger all access paths, which led to the difficulty of universal detection of logical vulnerabilities, game theory was applied to the access control logic vulnerability detection for the first time. The vulnerabilities were identified by analyzing the game results of different participants on resource pages in the Web application, so that the access logic of different users could be targeted to obtain. Experimental results demonstrate that the proposed method successfully detect 31 vulnerabilities, including 8 unreported ones, out of 11 open-source applications, with a detection range exceeding 90%.
format Article
id doaj-art-c76eedcad4da492f84916df5e606645b
institution Kabale University
issn 1000-436X
language zho
publishDate 2024-06-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-c76eedcad4da492f84916df5e606645b2025-01-14T07:24:30ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2024-06-014511713063977209Game-based detection method of broken access control vulnerabilities in Web applicationHE HaitaoXU KeYANG ShuailinZHANG BingZHAO YuxuanLI JiazhengTo solve the problem that the access control strategy of the program in the industrial Internet was difficult to extract from the source code, and that the user’s access operation was difficult to trigger all access paths, which led to the difficulty of universal detection of logical vulnerabilities, game theory was applied to the access control logic vulnerability detection for the first time. The vulnerabilities were identified by analyzing the game results of different participants on resource pages in the Web application, so that the access logic of different users could be targeted to obtain. Experimental results demonstrate that the proposed method successfully detect 31 vulnerabilities, including 8 unreported ones, out of 11 open-source applications, with a detection range exceeding 90%.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024078/Web application securityvulnerability detectionaccess control vulnerabilityaccess control rulegame
spellingShingle HE Haitao
XU Ke
YANG Shuailin
ZHANG Bing
ZHAO Yuxuan
LI Jiazheng
Game-based detection method of broken access control vulnerabilities in Web application
Tongxin xuebao
Web application security
vulnerability detection
access control vulnerability
access control rule
game
title Game-based detection method of broken access control vulnerabilities in Web application
title_full Game-based detection method of broken access control vulnerabilities in Web application
title_fullStr Game-based detection method of broken access control vulnerabilities in Web application
title_full_unstemmed Game-based detection method of broken access control vulnerabilities in Web application
title_short Game-based detection method of broken access control vulnerabilities in Web application
title_sort game based detection method of broken access control vulnerabilities in web application
topic Web application security
vulnerability detection
access control vulnerability
access control rule
game
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024078/
work_keys_str_mv AT hehaitao gamebaseddetectionmethodofbrokenaccesscontrolvulnerabilitiesinwebapplication
AT xuke gamebaseddetectionmethodofbrokenaccesscontrolvulnerabilitiesinwebapplication
AT yangshuailin gamebaseddetectionmethodofbrokenaccesscontrolvulnerabilitiesinwebapplication
AT zhangbing gamebaseddetectionmethodofbrokenaccesscontrolvulnerabilitiesinwebapplication
AT zhaoyuxuan gamebaseddetectionmethodofbrokenaccesscontrolvulnerabilitiesinwebapplication
AT lijiazheng gamebaseddetectionmethodofbrokenaccesscontrolvulnerabilitiesinwebapplication