Enhancing Web Application Penetration Testing with a Static Application Security Testing (SAST) Tool

Static Application Security Testing (SAST) is a crucial methodology employed to assess the security posture of an organization's applications by scrutinizing source code for vulnerabilities susceptible to exploitation. Typically, SAST tools adopt rule-based techniques to meticulously scan sourc...

Full description

Bibliographic Details
Published in:8th International Conference on Recent Advances and Innovations in Engineering: Empowering Computing, Analytics, and Engineering Through Digital Innovation, ICRAIE 2023
Main Author: Darus M.Y.; Farhan Bin Bolhan M.; Kurniawan A.; Muliono Y.; Pardomuan C.R.; Mohamad Hata M.
Format: Conference paper
Language:English
Published: Institute of Electrical and Electronics Engineers Inc. 2023
Online Access:https://www.scopus.com/inward/record.uri?eid=2-s2.0-85189929488&doi=10.1109%2fICRAIE59459.2023.10468317&partnerID=40&md5=a53ccfdae937fa33cb070ec7ccc762f4
id 2-s2.0-85189929488
spelling 2-s2.0-85189929488
Darus M.Y.; Farhan Bin Bolhan M.; Kurniawan A.; Muliono Y.; Pardomuan C.R.; Mohamad Hata M.
Enhancing Web Application Penetration Testing with a Static Application Security Testing (SAST) Tool
2023
8th International Conference on Recent Advances and Innovations in Engineering: Empowering Computing, Analytics, and Engineering Through Digital Innovation, ICRAIE 2023


10.1109/ICRAIE59459.2023.10468317
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85189929488&doi=10.1109%2fICRAIE59459.2023.10468317&partnerID=40&md5=a53ccfdae937fa33cb070ec7ccc762f4
Static Application Security Testing (SAST) is a crucial methodology employed to assess the security posture of an organization's applications by scrutinizing source code for vulnerabilities susceptible to exploitation. Typically, SAST tools adopt rule-based techniques to meticulously scan source code for security shortcomings, ultimately enhancing the overall quality of applications. Notably, Java and PHP stand as two widely used languages in the development of open-source web applications, each bearing distinct security reputations. In the contemporary landscape, the sheer volume of code makes it increasingly challenging to conduct exhaustive line-by-line vulnerability assessments. This research introduces a novel SAST methodology implemented in the Python programming language. This approach is tailored to pinpoint vulnerabilities within the application layer, with a particular focus on identifying SQL injection and Cross-Site Scripting (XSS) vulnerabilities within both Java and PHP codebases. Thus, this research seeks to validate the system's efficacy in detecting these critical vulnerabilities in PHP and Java programming languages. To evaluate the system's performance, penetration testing techniques are employed to establish proof of concept. These techniques entail conducting sample tests on vulnerable web applications, such as DVWA (PHP) and WebGoat (Java). Subsequently, an in-depth analysis of the testing outcomes is conducted using confusion matrices, recall, and precision metrics. The proposed SAST methodology presents a valuable resource for software developers, facilitating the analysis of source code or compiled code versions to unearth security flaws. The testing results indicate an accuracy rate of 20.7% for the SAST, underscoring its potential to contribute significantly to the enhancement of application security. Cross-site scripting (XSS), SQL Injection, Web Vulnerability, Web Security, Static Application Security Testing (SAST) © 2023 IEEE.
Institute of Electrical and Electronics Engineers Inc.

English
Conference paper

author Darus M.Y.; Farhan Bin Bolhan M.; Kurniawan A.; Muliono Y.; Pardomuan C.R.; Mohamad Hata M.
spellingShingle Darus M.Y.; Farhan Bin Bolhan M.; Kurniawan A.; Muliono Y.; Pardomuan C.R.; Mohamad Hata M.
Enhancing Web Application Penetration Testing with a Static Application Security Testing (SAST) Tool
author_facet Darus M.Y.; Farhan Bin Bolhan M.; Kurniawan A.; Muliono Y.; Pardomuan C.R.; Mohamad Hata M.
author_sort Darus M.Y.; Farhan Bin Bolhan M.; Kurniawan A.; Muliono Y.; Pardomuan C.R.; Mohamad Hata M.
title Enhancing Web Application Penetration Testing with a Static Application Security Testing (SAST) Tool
title_short Enhancing Web Application Penetration Testing with a Static Application Security Testing (SAST) Tool
title_full Enhancing Web Application Penetration Testing with a Static Application Security Testing (SAST) Tool
title_fullStr Enhancing Web Application Penetration Testing with a Static Application Security Testing (SAST) Tool
title_full_unstemmed Enhancing Web Application Penetration Testing with a Static Application Security Testing (SAST) Tool
title_sort Enhancing Web Application Penetration Testing with a Static Application Security Testing (SAST) Tool
publishDate 2023
container_title 8th International Conference on Recent Advances and Innovations in Engineering: Empowering Computing, Analytics, and Engineering Through Digital Innovation, ICRAIE 2023
container_volume
container_issue
doi_str_mv 10.1109/ICRAIE59459.2023.10468317
url https://www.scopus.com/inward/record.uri?eid=2-s2.0-85189929488&doi=10.1109%2fICRAIE59459.2023.10468317&partnerID=40&md5=a53ccfdae937fa33cb070ec7ccc762f4
description Static Application Security Testing (SAST) is a crucial methodology employed to assess the security posture of an organization's applications by scrutinizing source code for vulnerabilities susceptible to exploitation. Typically, SAST tools adopt rule-based techniques to meticulously scan source code for security shortcomings, ultimately enhancing the overall quality of applications. Notably, Java and PHP stand as two widely used languages in the development of open-source web applications, each bearing distinct security reputations. In the contemporary landscape, the sheer volume of code makes it increasingly challenging to conduct exhaustive line-by-line vulnerability assessments. This research introduces a novel SAST methodology implemented in the Python programming language. This approach is tailored to pinpoint vulnerabilities within the application layer, with a particular focus on identifying SQL injection and Cross-Site Scripting (XSS) vulnerabilities within both Java and PHP codebases. Thus, this research seeks to validate the system's efficacy in detecting these critical vulnerabilities in PHP and Java programming languages. To evaluate the system's performance, penetration testing techniques are employed to establish proof of concept. These techniques entail conducting sample tests on vulnerable web applications, such as DVWA (PHP) and WebGoat (Java). Subsequently, an in-depth analysis of the testing outcomes is conducted using confusion matrices, recall, and precision metrics. The proposed SAST methodology presents a valuable resource for software developers, facilitating the analysis of source code or compiled code versions to unearth security flaws. The testing results indicate an accuracy rate of 20.7% for the SAST, underscoring its potential to contribute significantly to the enhancement of application security. Cross-site scripting (XSS), SQL Injection, Web Vulnerability, Web Security, Static Application Security Testing (SAST) © 2023 IEEE.
publisher Institute of Electrical and Electronics Engineers Inc.
issn
language English
format Conference paper
accesstype
record_format scopus
collection Scopus
_version_ 1798286506102620160