Automating SQL Injection and Cross-Site Scripting Vulnerability Remediation in Code

  • Sambhus K
  • Liu Y
N/ACitations
Citations of this article
27Readers
Mendeley users who have this article in their library.

Abstract

Internet-based distributed systems dominate contemporary software applications. To enable these applications to operate securely, software developers must mitigate the threats posed by malicious actors. For instance, the developers must identify vulnerabilities in the software and eliminate them. However, to do so manually is a costly and time-consuming process. To reduce these costs, we designed and implemented Code Auto-Remediation for Enhanced Security (CARES), a web application that automatically identifies and remediates the two most common types of vulnerabilities in Java-based web applications: SQL injection (SQLi) and Cross-Site Scripting (XSS). As is shown by a case study presented in this paper, CARES mitigates these vulnerabilities by refactoring the Java code using the Intercepting Filter design pattern. The flexible, microservice-based CARES design can be readily extended to support other injection vulnerabilities, remediation design patterns, and programming languages.

Cite

CITATION STYLE

APA

Sambhus, K., & Liu, Y. (2024). Automating SQL Injection and Cross-Site Scripting Vulnerability Remediation in Code. Software, 3(1), 28–46. https://doi.org/10.3390/software3010002

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free