2010
DOI: 10.1007/978-3-642-12002-2_13
|View full text |Cite
|
Sign up to set email alerts
|

Stranger: An Automata-Based String Analysis Tool for PHP

Abstract: Abstract. STRANGER is an automata-based string analysis tool for finding and eliminating string-related security vulnerabilities in PHP applications. STRANGER uses symbolic forward and backward reachability analyses to compute the possible values that the string expressions can take during program execution. STRANGER can automatically (1) prove that an application is free from specified attacks or (2) generate vulnerability signatures that characterize all malicious inputs that can be used to generate attacks.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
108
0
1

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 117 publications
(109 citation statements)
references
References 8 publications
(15 reference statements)
0
108
0
1
Order By: Relevance
“…DFA based symbolic string analysis has been used to verify the correctness of string sanitization operations in PHP programs [23], [22]. Recently, foundations of relational string analysis using multi-track automata (as opposed to single-track automata used in our analysis) were investigated in [24].…”
Section: Related Workmentioning
confidence: 99%
“…DFA based symbolic string analysis has been used to verify the correctness of string sanitization operations in PHP programs [23], [22]. Recently, foundations of relational string analysis using multi-track automata (as opposed to single-track automata used in our analysis) were investigated in [24].…”
Section: Related Workmentioning
confidence: 99%
“…While there are some external string solvers [2,20,8,18,15,9] available, none of them meets our need to obtain a good balance between efficiency, accuracy, and comprehensiveness. Roughly, existing solvers can be divided into two categories: (1) bit-vector (BV) based methods, which model a string with a fixedlength bit-vector; and (2) automaton based methods, which model a string with an automaton.…”
Section: Introductionmentioning
confidence: 99%
“…The Rex tool [18] uses automaton and an SMT solver, and represents automaton transitions using logical predicates. Stranger [20] uses an automaton-based method to model string constraints and length bounds for abstract interpretation. A lazy solving technique [11] uses automaton with transitions annotated with integer ranges.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations