Blending Static and Dynamic Analysis for Web Application Vulnerability Detection: Methodology and Case Study

Static Analysis (SA) and Dynamic Analysis (DA) are complementary techniques for searching web application vulnerabilities. Typically, SA detects more vulnerabilities but reports a higher number of false positives, whereas DA finds less but with better precision. In this paper, we blend SA and DA to...

Full description

Saved in:
Bibliographic Details
Main Authors: Paulo Nunes, Jose Fonseca, Marco Vieira
Format: Article
Language:English
Published: IEEE 2025-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10813334/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841557060093739008
author Paulo Nunes
Jose Fonseca
Marco Vieira
author_facet Paulo Nunes
Jose Fonseca
Marco Vieira
author_sort Paulo Nunes
collection DOAJ
description Static Analysis (SA) and Dynamic Analysis (DA) are complementary techniques for searching web application vulnerabilities. Typically, SA detects more vulnerabilities but reports a higher number of false positives, whereas DA finds less but with better precision. In this paper, we blend SA and DA to simultaneously improve the detection and decrease the false alarms. Our approach starts with SA to identify an initial set of potential vulnerabilities. Then, the target application is executed to obtain specific runtime information. These data are used to automatically configure the DA, improving its ability to confirm if the vulnerabilities reported by the SA are indeed exploitable. We evaluated the proposed approach using 49 WordPress plugins with more than 450 SQLi vulnerabilities. Our approach was able to confirm either as a vulnerability or a false alarm 76.7% of the results reported by the SA, decreasing tremendously the usual need for manual work, which is a huge improvement for security practitioners.
format Article
id doaj-art-f3009e1a914348b6a3fbfdee09a50449
institution Kabale University
issn 2169-3536
language English
publishDate 2025-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj-art-f3009e1a914348b6a3fbfdee09a504492025-01-07T00:02:14ZengIEEEIEEE Access2169-35362025-01-01133139315310.1109/ACCESS.2024.352209410813334Blending Static and Dynamic Analysis for Web Application Vulnerability Detection: Methodology and Case StudyPaulo Nunes0https://orcid.org/0000-0002-2719-9318Jose Fonseca1https://orcid.org/0000-0003-4710-9292Marco Vieira2https://orcid.org/0000-0001-5103-8541Polytechnic of Guarda, University of Coimbra, CISUC, Coimbra, PortugalPolytechnic of Guarda, University of Coimbra, CISUC, Coimbra, PortugalUniversity of North Carolina at Charlotte, Charlotte, NC, USAStatic Analysis (SA) and Dynamic Analysis (DA) are complementary techniques for searching web application vulnerabilities. Typically, SA detects more vulnerabilities but reports a higher number of false positives, whereas DA finds less but with better precision. In this paper, we blend SA and DA to simultaneously improve the detection and decrease the false alarms. Our approach starts with SA to identify an initial set of potential vulnerabilities. Then, the target application is executed to obtain specific runtime information. These data are used to automatically configure the DA, improving its ability to confirm if the vulnerabilities reported by the SA are indeed exploitable. We evaluated the proposed approach using 49 WordPress plugins with more than 450 SQLi vulnerabilities. Our approach was able to confirm either as a vulnerability or a false alarm 76.7% of the results reported by the SA, decreasing tremendously the usual need for manual work, which is a huge improvement for security practitioners.https://ieeexplore.ieee.org/document/10813334/Static analysisdynamic analysisvulnerability detectionexecution tracesSQLiblend analysis
spellingShingle Paulo Nunes
Jose Fonseca
Marco Vieira
Blending Static and Dynamic Analysis for Web Application Vulnerability Detection: Methodology and Case Study
IEEE Access
Static analysis
dynamic analysis
vulnerability detection
execution traces
SQLi
blend analysis
title Blending Static and Dynamic Analysis for Web Application Vulnerability Detection: Methodology and Case Study
title_full Blending Static and Dynamic Analysis for Web Application Vulnerability Detection: Methodology and Case Study
title_fullStr Blending Static and Dynamic Analysis for Web Application Vulnerability Detection: Methodology and Case Study
title_full_unstemmed Blending Static and Dynamic Analysis for Web Application Vulnerability Detection: Methodology and Case Study
title_short Blending Static and Dynamic Analysis for Web Application Vulnerability Detection: Methodology and Case Study
title_sort blending static and dynamic analysis for web application vulnerability detection methodology and case study
topic Static analysis
dynamic analysis
vulnerability detection
execution traces
SQLi
blend analysis
url https://ieeexplore.ieee.org/document/10813334/
work_keys_str_mv AT paulonunes blendingstaticanddynamicanalysisforwebapplicationvulnerabilitydetectionmethodologyandcasestudy
AT josefonseca blendingstaticanddynamicanalysisforwebapplicationvulnerabilitydetectionmethodologyandcasestudy
AT marcovieira blendingstaticanddynamicanalysisforwebapplicationvulnerabilitydetectionmethodologyandcasestudy