An Industrial Case Study of Bypass Testing on Web .ppt
《An Industrial Case Study of Bypass Testing on Web .ppt》由会员分享,可在线阅读,更多相关《An Industrial Case Study of Bypass Testing on Web .ppt(34页珍藏版)》请在麦多课文档分享上搜索。
1、An Industrial Case Study of Bypass Testing on Web Applications,Joint research Dr. Ye Wu, Xiaochen Du, Hong Huang, Vasileios Papadimitriou, Qingxiang Wang and Joann J. Ordille of Avaya Labs Research Based on papers in ISSRE 2004 and ICST 2008,Jeff Offutt Software Engineering George Mason University F
2、airfax, VA USA www.cs.gmu.edu/offutt/ offuttgmu.edu,Expanded version of a talk given at the first International Conference on Software Testing, Verification and Validation,Outline of Talk,Motivation Applying bypass testing early results Automating bypass testing Real-world examples Industrial case s
3、tudy Conclusions and future work,ICST 2008, Jeff Offutt,2,Web Application Input Validation,Sensitive Data,Client,Server, Jeff Offutt, 2004,4,Deploying Software,Bundled : Pre-installed on computer Shrink-wrap : Bought and installed by end-users Contract : Purchaser pays developer to develop and insta
4、ll, usually for a fixed price Embedded : Installed on a hardware device, usually with no direct communication with user,Web : Executed across the Internet through HTTP, Jeff Offutt,5,Problem Parameters,HTTP is a stateless protocol Each request is independent of previous request Servers have little i
5、nformation about where a request comes from Web site software is extremely loosely coupled Coupled through the Internet separated by space Coupled to diverse hardware devices Written in diverse software languages,ICST 2008, Jeff Offutt,6,Bypass Testing,“bypass” client-side constraint enforcementBypa
6、ss testing constructs tests to intentionally violate constraints : Eases test automation Validates input validation Checks robustness Evaluates security,ICST 2008, Jeff Offutt,7,User Name:,Small $150,Version to purchase:,Age:,Large $500,Medium $250,Simple Example Web Page,ICST 2008, Jeff Offutt,8,Us
7、er Name:,Small $150,Version to purchase:,Age:,Large $500,Medium $250,Proper Behavior,ICST 2008, Jeff Offutt,9,Abbreviated HTML,Version to purchase:,ICST 2008, Jeff Offutt,10,Bypass Behavior,Extremely loose coupling combined with the stateless protocol allows users to easily bypass client-side checki
8、ng :,Users can save and modify the HTML,ICST 2008, Jeff Offutt,11,Saved & Modified HTML,Version to purchase:,Allows an input with arbitrary age, no checking, cost=$25 can crash an XML parser Text fields can have SQL statements,25,yes,ICST 2008, Jeff Offutt, 2004,12,SQL Injection, Jeff Offutt,13,Appl
9、ying Bypass Testing,Analyze HTML to extract each form element Model constraints imposed by HTML and JavaScript Rules for data generation : From client-side constraints Typical security violations Common input mistakes,ICST 2008,Validating input data on the client is like asking your opponent to hold
10、 your shield in a sword fight, Jeff Offutt, 2004,14,Example Client-Side Constraint Rules,Violate size restrictions on strings Introduce values not included in static choices Radio boxes Select (drop-down) lists Violate hard-coded values Use values that JavaScripts flag as errors Change “transfer mod
11、e” (get, post, ) Change destination URLs, Jeff Offutt, 2004,15,Example Server-Side Constraint Rules,Data type conversionData format validationInter-field constraint validationInter-request data fields (cookies, hidden), Jeff Offutt, 2004,16,Example Security Violation Rules, Jeff Offutt, 2004,17,Firs
12、t Example CyberChair,CyberChair : Web-based conference management www.cyberchair.org ICSE , ICST, ISSRE, ICSM, Bypass testing found 5 types of faults Submission without authentication Unsafe use of hidden form field Disclosing information (program crashes) Lack of validation of file type Allows pape
13、rs of negative length,Automating Bypass Testing,Autobypass : A web application that accepts a URL and generates input data for the HTML form fields Also accepts any needed login data MS thesis by Vasileios Papadimitriou Built on top of HttpUnit Parses HMTL pages Identifies forms and their fields Cre
14、ates bypass test cases Submits test cases to the applications server,ICST 2008, Jeff Offutt,18,Types of Client Input Validation,Client side input validation is performed by HTML form controls, their attributes, and client side scripts that access DOM Validation types are categorized as HTML and scri
15、pting HTML supports syntactic validation Client scripting can perform both syntactic and semantic validation,ICST 2008, Jeff Offutt,19,Example Interface: yahoo registration form,ICST 2008, Jeff Offutt,20,Limited Length (HTML),Preset Values (HTML),Preset Transfer Mode in form definition (HTML),Preset
16、 No of Fields (HTML),URL with preset Values (HTML),Data Value, Type, & Format validation (script),Inter Value validation (script),Test Value Selection,Challenge: How to automatically provide effective test values? Semantic Domain Problem (SDP) Values within the application domain are needed Enumerat
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ANINDUSTRIALCASESTUDYOFBYPASSTESTINGONWEBPPT

链接地址:http://www.mydoc123.com/p-378277.html