scholarly journals A Critical-Path-Coverage-Based Vulnerability Detection Method for Smart Contracts

IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 147327-147344 ◽  
Author(s):  
Menglin Fu ◽  
Lifa Wu ◽  
Zheng Hong ◽  
Feng Zhu ◽  
He Sun ◽  
...  
2013 ◽  
Vol 347-350 ◽  
pp. 3715-3720
Author(s):  
Bei Hai Liang ◽  
Bin Bin Qu ◽  
Sheng Jiang ◽  
Chu Tian Ye

At present, Cross Site Scripting (XSS) vulnerability exists in most web sites. The main reason is the lack of effective validation and filtering mechanisms for user input data from web request. This paper explores vulnerability detection method which based on taint dependence analysis and implements a prototype system for Java Web program. We treat all user input as tainted data, and track the flow of Web applications, then we judge whether it will trigger an attack or not. The taint dependent analysis algorithm mentioned in this paper is used to construct the taint dependency graph. Next the value representation method of the string tainted object based on finite state automata is discussed. Finally, we propose the vulnerability detection method for the program. The experiment result shows that the prototype system can detect reflection cross-site scripting vulnerability well in those programs which dont have effective treatment for the user input data.


2013 ◽  
Vol 4 (2/3) ◽  
pp. 134 ◽  
Author(s):  
Siwei Peng ◽  
Baojiang Cui ◽  
Ru Jia ◽  
Shurui Liang ◽  
Yiying Zhang

Sign in / Sign up

Export Citation Format

Share Document