Quo vadis? A study of the evolution of input validation vulnerabilities in Web applications

Scholte, Theodoor; Balzarotti, Davide; Kirda, Engin
FC 2011, 15th International Conference on Financial Cryptography and Data Security, February 28-March 4, 2011
Bay Gardens Beach Resort, St. Lucia / Also published as "LNCS", Volume 7035/2012

Web applications have become important services in our daily lives. Millions of users use web applications to obtain information, perform financial transactions, have fun, socialize, and communicate. Unfortunately, web applications are also frequently targeted by attackers. Recent data from SANS institute estimates that up to 60% of Internet attacks target web applications.

In this paper, we perform an empirical analysis of a large number of web vulnerability reports with the aim of understanding how input validation flaws have evolved in the last decade. In particular, we are interested in finding out if developers are more aware of web security problems today than they used to be in the past. Our results suggest that the complexity of the attacks have not changed significantly and that many web problems are still simple in nature. Hence, despite awareness programs provided by organizations such as MITRE, SANS Institute and OWASP, application developers seem to be either not aware of these classes of vulnerabilities, or unable to implement effective countermeasures. Therefore, we believe that there is a growing need for languages and application platforms that attack the root of the problem and secure applications by design.

 


DOI
Type:
Conférence
City:
Bay Gardens Beach Resort
Date:
2011-02-28
Department:
Sécurité numérique
Eurecom Ref:
3277
Copyright:
© Springer. Personal use of this material is permitted. The definitive version of this paper was published in FC 2011, 15th International Conference on Financial Cryptography and Data Security, February 28-March 4, 2011
Bay Gardens Beach Resort, St. Lucia / Also published as "LNCS", Volume 7035/2012 and is available at : http://dx.doi.org/10.1007/978-3-642-27576-0_24

PERMALINK : https://www.eurecom.fr/publication/3277