4MMSR-Network Security-2012-2013-taint assisted dom xss fuzzing : Différence entre versions
De Ensiwiki
Ligne 23 : | Ligne 23 : | ||
− | |research_questions | + | |research_questions |
* propose a methodology for producing a DOM-XSS grammar | * propose a methodology for producing a DOM-XSS grammar | ||
* what are the intuitions for writing the most relevant fitness function dimensions? | * what are the intuitions for writing the most relevant fitness function dimensions? |
Version du 31 décembre 2012 à 12:15
Sommaire
Taint Assisted DOM-XSS Fuzzing
This is a "mini" research project for the course 4MMSR-Network Security
Keywords
fuzzing,DOM/type-0 XSS,data tainting
Description
DOM XSS is an injection vulnerability for which few attack grammars do exist. The problem formalization can be derived from .
Expected output
- formalize the DOM XSS problem
- write a DOM-XSS attack grammar
- interface with Dominator Pro to obtain:
- the number of tainted nodes
- if a DOM XSS attack did occur or not (test verdict)
- write a fitness function for directing DOM XSS fuzzing
- write an evolutionary fuzzer
Research Questions
{{{research_questions}}}
References
- DOM Based Cross Site Scripting or XSS of the Third Kind, Amit Klein, 2005
- Finding DOM XSS with Dominator Pro, Stefano di Paola, 2011
- XSS Vulnerability Detection Using Model Inference Assisted Evolutionary Fuzzing, Fabien Duchene & Sanjay Rawat & Roland Groz & Jean-Luc Richier, 2012
- SPaCIoS, D3.3 "Methodology and technology for vulnerability-driven security testing", section "An Evolutionary Smart-Fuzzing Approach for Detecting XSS Injections Attacks", 2013
Tools
Results
{{{results}}}
Get Started!
- create an archive on the ensimag server, so that only your team members and I have access to it.
- Créer_une_archive_partagée_avec_Git
- obviously, do not forget to send me the path afterwards