The SPaCIoS Tool property-driven and vulnerability-driven security - - PowerPoint PPT Presentation

the spacios tool
SMART_READER_LITE
LIVE PREVIEW

The SPaCIoS Tool property-driven and vulnerability-driven security - - PowerPoint PPT Presentation

The SPaCIoS Tool property-driven and vulnerability-driven security testing for Web-based apps Alessandro Armando DIBRIS University of Genova and Security & Trust FBK, Trento (on behalf of the SPaCIoS consortium) STREP Project number:


slide-1
SLIDE 1

The SPaCIoS Tool

property-driven and vulnerability-driven security testing for Web-based apps

Alessandro Armando

DIBRIS – University of Genova and Security & Trust – FBK, Trento (on behalf of the SPaCIoS consortium)

STREP Project number: 257876 Objective ICT-2009.1.4 c: Technology and Tools for Trustworthy ICT 01.10.10 − 31.01.14

www.spacios.eu

slide-2
SLIDE 2

Motivations

slide-3
SLIDE 3

Goal

slide-4
SLIDE 4

Model Checking vs Penetration Testing

Model Checking Penetration Testing The SPaCIoS Ideal Target of Verification Abstraction of Actual System (the Model) Actual System (the System Under Validation, SUV)

  • 1. Use model to test

system

  • 2. Use system to

discharge spurious attacks

  • 3. Use system to build

model Scope Design flaws Implementation flaws Design and Implementation flaws (and their interaction) Input Model + Spec

  • f Sec. Goals

& Assumptions Vulnerabilities to seek (attack surface automatically discovered) Partial model, sec. goals & assumptions, vulnerabilities (in user friendly notation) Automation High Low High

slide-5
SLIDE 5

Model of the SUV Abstract execution trace Test case

The SPaCIoS Tool

Test Execution Engine

Vulnerabilities Attack Patterns Security Goals Attacker Models

User Interface

Model

  • f the

SUV Security goals User guidance

Security Analyst

Model inference and adjustment Property-driven and vulnerability-driven test case generation Libraries

Test Results

Model of the attacker Fault location SUV source code Source based inference Trace- driven fault localization

SUV

Research prototype

  • model checking
  • security testing
  • penetration testing

Complements state-of-the-art Targets industrially-relevant Security Protocols & Web Apps Broad security range

  • logic-flaws, injections, AC, …
  • good coverage of OWASP top 10

Promising results

  • SAML SSO, OAuth2, ..
  • WebGoat, Shopping Cart, ..

On-going transfers to SAP and SIEMENS

(System Under Validation)

slide-6
SLIDE 6

Research prototype

  • model checking
  • security testing
  • penetration testing

Complements state-of-the-art Targets industrially-relevant Security Protocols & Web Apps Broad security range

  • logic-flaws, injections, AC, …
  • good coverage of OWASP top 10

Promising results

  • SAML SSO, OAuth2, ..
  • WebGoat, Shopping Cart, ..

On-going transfers to SAP and SIEMENS

slide-7
SLIDE 7

The SPaCIoS Tool

  • Property-driven Security Testing
  • Model Inference
  • Mutation-based Testing
  • Vulnerabilty-driven Testing
slide-8
SLIDE 8

Model Property Model Model Checker

SUV

Property Attack trace Test case Test execution engine Input Output

Security impact?

Concretization SUV data

GET http:// … HTTP/1.1 200 OK … GET http:// … HTTP/1.1 302… …

  • 1. Step_C_1(…)
  • 2. Step_SP_1(…)
  • 3. Step_C_2(…)

…``

property-driven security testing

slide-9
SLIDE 9

Property

SUV

Property Test case Test execution engine Input Output

Models?

Model Model Black-box model- inference Model Model

Model inference

Model Checker Attack trace Concretization SUV data

: black-box

slide-10
SLIDE 10

Property

SUV

Property Test case Test execution engine Input Output

Models?

Model Model White-box model- inference Model Model

Model inference: white-box

source code

  • f system

Model Checker Attack trace Concretization SUV data

slide-11
SLIDE 11

Property

SUV

Property Test case Test execution engine Input Output

Models?

Model Model translator Model Model

Model inference: sequence diagrams

Sequence diagrams Model Checker Attack trace Concretization SUV data

slide-12
SLIDE 12

Model Property Model

SUV

Property Test case Test execution engine Input Output

No attack traces?

Mutation

  • perators

Mutation engine Mutated Model Model Checker Attack trace Concretization SUV data

Mutation-based Testing

slide-13
SLIDE 13

Model Property Model Model Checker

SUV

Property Attack trace Test case Test execution engine Input Output Concretization SUV data

Vulnerability-driven Testing

Well-known vulnerabilities?

slide-14
SLIDE 14

SUV

Test case Test execution engine Input Output

Well-known vulnerabilities?

Attack pattern models Instantiation files SUV data Concretization

slide-15
SLIDE 15

Attack Pattern + Instantiation file + SUV data

slide-16
SLIDE 16

OWASP Top 10 The SPaCIoS Tool A1 Injection WebGoat lesson: String SQL Injection WebGoat lesson: Numeric SQL Injection SIEMENS InfoBase and eHealth A2 Broken Authentication & Session Management SAML, OpenID, OAuth: e.g., authentication logic-flaws Password brute-forcing on SIEMENS InfoBase and eHealth A3 Cross-Site Scripting WebGoat lesson: Stored XSS WebGoat lesson: Reflected XSS SIEMENS InfoCase and eHealth A4 Insecure Direct Object References SIEMENS InfoBase and eHealth: File Enumeration and Path Traversal A5 Security Misconfiguration WebGoat lesson: Forced Browsing (File Enumeration) A6 Sensitive Data Exposure SAML, OpenID, OAuth: data confidentiality logic flaws A7 Missing Function Level Access Control WebGoat lesson: Bypass Business Layer Access Control, WebGoat lesson: Bypass Data Layer Access Control WebGoat lesson: Role Based Access Control SIEMENS eHealth A8 CSRF SIEMENS InfoBase and eHealth A9 Using Components with Known Vulnerabilities A10 Unvalidated Redirects and Forwards

slide-17
SLIDE 17

Research prototype

  • model checking
  • security testing
  • penetration testing

Complements state-of-the-art Targets industrially-relevant Security Protocols & Web Apps Broad security range

  • logic-flaws, injections, AC, …
  • good coverage of OWASP top 10

Promising results

  • SAML SSO, OAuth2, ..
  • WebGoat, Shopping Cart, ..

On-going transfers to SAP and SIEMENS

Thank you!

Model of the SUV Abstract execution trace Test case

The SPaCIoS Tool

Test Execution Engine Vulnerabilities Attack Patterns Security Goals Attacker Models User Interface Model

  • f the

SUV Security goals User guidance

Security Analyst

Model inference and adjustment Property-driven and vulnerability-driven test case generation Libraries

Test Results

Model of the attacker Fault location SUV source code Source based inference Trace- driven fault localization

SUV

The SPaCIoS Tool is available for public download at http://www.spacios.eu