FIELD: information technology.
SUBSTANCE: method of determining vulnerable functions in automated scanning of web applications for presence of vulnerabilities and non-declared capabilities comprises compiling a list of source texts of web applications intended for generating testing parameters, and setting source text parameters for testing; parsing the source texts using the given parameters and adding distinctive labels to the source text with indication of label-function pairs; performing automatic scanning and search for program errors in web applications and, in case of error, obtaining debugging data in the form of machine code, describing the currently executed module and containing the name of the corresponding label; determining, from said label, the corresponding label-function pair and obtaining the name of the vulnerable function, as well as the full name of the module containing the vulnerable function.
EFFECT: high number of potentially detected vulnerabilities of web applications, shorter time needed for manual analysis of program errors in order to determine criticality thereof.
3 cl
Title | Year | Author | Number |
---|---|---|---|
METHOD AND SYSTEM FOR ELIMINATING VULNERABILITIES IN PROGRAM CODE | 2023 |
|
RU2821220C1 |
METHOD AND SYSTEM FOR IDENTIFYING EXPLOITED VULNERABILITIES IN THE PROGRAM CODE | 2022 |
|
RU2790005C1 |
IDENTIFICATION OF SECURITY VULNERABILITIES IN APPLICATION PROGRAM INTERFACES | 2017 |
|
RU2755675C2 |
SYSTEM AND METHOD FOR STATIC ANALYSIS OF EXECUTABLE BINARY CODE AND SOURCE CODE USING FUZZY LOGIC | 2021 |
|
RU2783152C1 |
AUTOMATED SAFETY ASSESSMENT OF BUSINESS-CRITICAL COMPUTER SYSTEMS AND RESOURCES | 2011 |
|
RU2657170C2 |
DEBUGGING NATIVE CODE BY TRANSITIONING FROM EXECUTION IN NATIVE MODE TO EXECUTION IN INTERPRETED MODE | 2014 |
|
RU2668973C2 |
SYSTEM AND METHOD OF DETECTING VULNERABILITIES USING INTERCEPTION OF FUNCTION CALLS | 2018 |
|
RU2697948C1 |
METHOD AND SYSTEM FOR AUTOMATED DOCUMENTATION OF SECURITY THREATS AND VULNERABILITIES RELATED TO AN INFORMATION RESOURCE | 2022 |
|
RU2789990C1 |
METHOD OF DETERMINING POTENTIAL THREATS TO INFORMATION SECURITY BASED ON INFORMATION ON VULNERABILITIES OF SOFTWARE | 2019 |
|
RU2705460C1 |
AUTOMATIC DETECTION AND RESPONSE TO VULNERABILITIES | 2007 |
|
RU2462754C2 |
Authors
Dates
2015-03-10—Published
2013-08-29—Filed