完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | 梁偉明 | en_US |
dc.contributor.author | Leong, Wai-Meng | en_US |
dc.contributor.author | 黃世昆 | en_US |
dc.contributor.author | Huang, Shih-Kun | en_US |
dc.date.accessioned | 2014-12-12T01:59:42Z | - |
dc.date.available | 2014-12-12T01:59:42Z | - |
dc.date.issued | 2011 | en_US |
dc.identifier.uri | http://140.113.39.130/cdrfb3/record/nctu/#GT079956543 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/50576 | - |
dc.description.abstract | 在資訊科技發達的年代,人們透過網頁方便的瀏覽或取得豐富的網路資源,但在急促的開發腳步下,開發者在開發過程中往往容易忽略安全的考量,導致駭客們能透過開發者的粗心,非法地存取或破壞資源。為了減少與彌補這類的安全問題,在網頁安全的領域上,已有各種不同的方法嘗試去防止或找出這類問題。本論文嘗試扮演攻擊者的角色,以自動產生攻擊字串為目標,達到駭客手動攻擊的相同效果。相較於其他傳統的檢測方法,更能確定漏洞的存在與證明攻擊的可行性。這樣的自動產生過程主要是基於一種動態的軟體測試方法-符號執行(symbolic execution)。最後以此自動化過程,測試幾個開源的大型網頁應用程式,針對已知的漏洞進行實驗,能成功產生相對應的攻擊字串。 | zh_TW |
dc.description.abstract | In the well-developed information age, people are easy to get the rich internet resource through web pages. However, in the rapid development process, developers often tend to ignore the security concern carelessly. This leads to access or destroy the resource illegally by hackers. In order to reduce and fix these types of security issues, various methods have been proposed and attempted to locate or prevent them in the field of web security. This thesis attempts to act as an attacker and exploit web applications directly. Our target is to automatically generate the attack string and reproduce the results, emulating the manual attack behavior. In contrast with other traditional detection and prevention methods, this thesis can certainly determine the presence of vulnerabilities and prove the feasibility of attacks. This automatic generation process is mainly based on a dynamic software testing method-symbolic execution. Finally, we have applied this automatic process to several known vulnerabilities on large-scale open source web applications, and generated the attack strings successfully. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | 網頁安全 | zh_TW |
dc.subject | 符號執行 | zh_TW |
dc.subject | 自動化攻擊碼產生 | zh_TW |
dc.subject | web security | en_US |
dc.subject | symbolic execution | en_US |
dc.subject | automatic exploit generation | en_US |
dc.title | 自動化網頁測試與攻擊產生 | zh_TW |
dc.title | Automatic Web Testing and Attack Generation | en_US |
dc.type | Thesis | en_US |
dc.contributor.department | 網路工程研究所 | zh_TW |
顯示於類別: | 畢業論文 |