AIM: Automated Input Set Minimization for Metamorphic Security Testing
Although the security testing of Web systems can be automated by generating crafted inputs, solutions to automate the test oracle, i.e., vulnerability detection, remain difficult to apply in practice. Specifically, though previous work has demonstrated the potential of metamorphic testing - security failures can be determined by metamorphic relations that turn valid inputs into malicious inputs - metamorphic relations are typically executed on a large set of inputs, which is time-consuming and thus makes metamorphic testing impractical.
We propose AIM, an approach that automatically selects inputs to reduce testing costs while preserving vulnerability detection capabilities. AIM includes a clustering-based black-box approach, to identify similar inputs based on their security properties. It also relies on a novel genetic algorithm to efficiently select diverse inputs while minimizing their total cost. Further, it contains a problem-reduction component to reduce the search space and speed up the minimization process. We evaluated the effectiveness of AIM on two well-known Web systems, Jenkins and Joomla, with documented vulnerabilities. We compared AIM’s results with four baselines involving standard search approaches. Overall, AIM reduced metamorphic testing time by 84% for Jenkins and 82% for Joomla, while preserving the same level of vulnerability detection. Furthermore, AIM significantly outperformed all the considered baselines regarding vulnerability coverage.
Link to original publication: https://doi.org/10.1109/TSE.2024.3488525
Tue 24 JunDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
10:30 - 12:30 | SecurityJournal First / Research Papers / Industry Papers at Aurora B Chair(s): Zhenchang Xing CSIRO’s Data61; Australian National University | ||
10:30 20mTalk | Come for Syntax, Stay for Speed, Write Secure Code: An Empirical Study of Security Weaknesses in Julia Programs Journal First Yue Zhang Auburn University, Justin Murphy Tennessee Tech University, Akond Rahman Auburn University | ||
10:50 20mTalk | AIM: Automated Input Set Minimization for Metamorphic Security Testing Journal First Nazanin Bayati Chaleshtari University of Ottawa, Yoann Marquer University of Luxembourg, Fabrizio Pastore University of Luxembourg, Lionel Briand University of Ottawa, Canada; Lero centre, University of Limerick, Ireland | ||
11:10 20mTalk | Understanding Industry Perspectives of Static Application Security Testing (SAST) Evaluation Research Papers Yuan Li Zhejiang University, Peisen Yao Zhejiang University, Kan Yu Ant Group, Chengpeng Wang Hong Kong University of Science and Technology, Yaoyang Ye Zhejiang University, Song Li The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Meng Luo The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Yepang Liu Southern University of Science and Technology, Kui Ren Zhejiang University DOI | ||
11:30 20mTalk | Efficient and Robust Security-Patch Localization for Disclosed OSS Vulnerabilities with Fine-Tuned LLMs in an Industrial Setting Industry Papers Dezhi Ran Peking University, Lin Li Huawei Cloud Computing Technologies Co., Ltd., Liuchuan Zhu Huawei Cloud Computing Technologies Co., Ltd., Yuan Cao Peking University, Landelong Zhao Peking University, Xin Tan Beihang University, Guangtai Liang Huawei Cloud Computing Technologies, Qianxiang Wang Huawei Technologies Co., Ltd, Tao Xie Peking University | ||
11:50 20mTalk | It’s Acting Odd! Exploring Equivocal Behaviors of Goodware Research Papers Gregorio Dalia University of Sannio, Andrea Di Sorbo University of Sannio, Corrado A. Visaggio University of Sannio, Italy, Gerardo Canfora University of Sannio DOI | ||
12:10 20mTalk | On the Unnecessary Complexity of Names in X.509 and Their Impact on Implementations Research Papers Yuteng Sun The Chinese University of Hong Kong, Joyanta Debnath Stony Brook University, Wenzheng Hong Independent, Omar Chowdhury Stony Brook University, Sze Yiu Chau The Chinese University of Hong Kong DOI |
Aurora B is the second room in the Aurora wing.
When facing the main Cosmos Hall, access to the Aurora wing is on the right, close to the side entrance of the hotel.