A Symbolic Execution Framework for JavaScript

P. Saxena,Devdatta Akhawe,Steve Hanna,Feng Mao,Stephen McCamant,D. Song

Published 2010 in IEEE Symposium on Security and Privacy

ABSTRACT

As AJAX applications gain popularity, client-side JavaScript code is becoming increasingly complex. However, few automated vulnerability analysis tools for JavaScript exist. In this paper, we describe the first system for exploring the execution space of JavaScript code using symbolic execution. To handle JavaScript code’s complex use of string operations, we design a new language of string constraints and implement a solver for it. We build an automatic end-to-end tool, Kudzu, and apply it to the problem of finding client-side code injection vulnerabilities. In experiments on 18 live web applications, Kudzu automatically discovers 2 previously unknown vulnerabilities and 9 more that were previously found only with a manually-constructed test suite.

PUBLICATION RECORD

  • Publication year

    2010

  • Venue

    IEEE Symposium on Security and Privacy

  • Publication date

    2010-05-16

  • Fields of study

    Computer Science

  • Identifiers
  • External record

    Open on Semantic Scholar

  • Source metadata

    Semantic Scholar

CITATION MAP

EXTRACTION MAP

CLAIMS

  • No claims are published for this paper.

CONCEPTS

  • No concepts are published for this paper.

REFERENCES

Showing 1-26 of 26 references · Page 1 of 1

CITED BY

Showing 1-100 of 531 citing papers · Page 1 of 6