Automated testing of complex Web 2.0 applications prevents security vulnerabilities

March 1st, 2013 in Technology / Software
Automated testing of complex Web 2.0 applications prevents security vulnerabilities
Computer scientists from Saarland University have developed a software system for checking complex web applications autonomously. Credit: bellhäuser - das bilderwerk


Computer scientists from Saarland University have developed a software system for checking complex web applications autonomously. Credit: bellhäuser - das bilderwerk

So far there are no methods to test complex web 2.0 applications systematically and at low cost for malfunctions and security vulnerabilities. Therefore, computer scientists from Saarland University have developed a software system for checking complex web applications autonomously.

"The police have discovered a new variant of . The offender capitalizes on the complexity of social networks", reported a newspaper a month ago in Southern Germany. Valentin Dallmeier, postdoc at the software engineering chair at Saarland University, is not surprised. He says that the methods that and responsible project leaders rely on to try to find and security holes in have been too ineffective and inefficient. "This is still done manually and therefore causes not only very high costs, but also high levels of risk for companies and the community," Martin Burger explains. He works at the software engineering chair, too. Together the two postdocs want to change this serious deficit. Therefore they have developed the software system "Webmate", which determines automatically why Web 2.0 applications fail.

For the transfer of the technology to a spin-off, they have just received 500,000 Euros from the national support program "EXIST" run by the Federal Ministry of Economics and Technology (BMWi). The program is aimed at improving the entrepreneurial environment at universities and and at increasing the number of technology- and knowledge-based business start-ups.

So called Web 2.0 applications run centrally on an online server. Therefore, in contrast to conventional programs, they are not installed on the user's computer or laptop; instead, the user interacts with them via a web browser. In recent years, thanks to new web development technologies such as Asynchronous JavaScript and XML (AJAX), web applications can be used as smoothly as if they were installed on personal computers. AJAX takes care of organizing the transfer of data packets between the user's computer and server in such a way that the delays incurred by the connection are barely noticeable. Hence, not only private users but also companies and the public sector are adopting web applications more and more frequently. However, news about data theft and malfunctions is also reported on a daily basis.

Dallmeier and Burger want to prevent such worst-case scenarios and other breakdowns. Businesses and their responsible web administrators will only have to type in their Web address. Afterwards the system discovers automatically how the different components of the application are connected to each other and via which menus, buttons, and other control panels the users are interacting with the application. Subsequently, it generates and executes test scenarios. If it discovers, for example, that the application is not compatible with a certain version of a browser, or a control panel no longer exists in a new version of the application, the system informs the developer immediately—likewise if a database is not connected, a server does not respond, or a link is dead. The web developer is able to repeat this test at any time.

Dallmeier, Burger and the three other persons planning to found the spin-off are sure that their technology will succeed. They estimate the market potential in Germany alone to be 120 million Euros annually.

More information: www.st.cs.uni-saarland.de/webmate/

Provided by Saarland University

"Automated testing of complex Web 2.0 applications prevents security vulnerabilities." March 1st, 2013. http://phys.org/news/2013-03-automated-complex-web-applications-vulnerabilities.html