Link: Black-Box Detection of Cross-Site Scripting Vulnerabilities Using Reinforcement Learning

30Citations
Citations of this article
38Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Black-box web scanners have been a prevalent means of performing penetration testing to find reflected cross-site scripting (XSS) vulnerabilities. Unfortunately, off-the-shelf black-box web scanners suffer from unscalable testing as well as false negatives that stem from a testing strategy that employs fixed attack payloads, thus disregarding the exploitation of contexts to trigger vulnerabilities. To this end, we propose a novel method of adapting attack payloads to a target reflected XSS vulnerability using reinforcement learning (RL). We present Link, a general RL framework whose states, actions, and a reward function are designed to find reflected XSS vulnerabilities in a black-box and fully automatic manner. Link finds 45, 213, and 60 vulnerabilities with no false positives in Firing-Range, OWASP, and WAVSEP benchmarks, respectively, outperforming state-of-the-art web scanners in terms of finding vulnerabilities and ending testing campaigns earlier. Link also finds 43 vulnerabilities in 12 real-world applications, demonstrating the promising efficacy of using RL in finding reflected XSS vulnerabilities.

Cite

CITATION STYLE

APA

Lee, S., Wi, S., & Son, S. (2022). Link: Black-Box Detection of Cross-Site Scripting Vulnerabilities Using Reinforcement Learning. In WWW 2022 - Proceedings of the ACM Web Conference 2022 (pp. 743–754). Association for Computing Machinery, Inc. https://doi.org/10.1145/3485447.3512234

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free