Our new X account is live! Follow @wizwand_team for updates
WorkDL logo mark

Anota: Identifying Business Logic Vulnerabilities via Annotation-Based Sanitization

About

Detecting business logic vulnerabilities is a critical challenge in software security. These flaws come from mistakes in an application's design or implementation and allow attackers to trigger unintended application behavior. Traditional fuzzing sanitizers for dynamic analysis excel at finding vulnerabilities related to memory safety violations but largely fail to detect business logic vulnerabilities, as these flaws require understanding application-specific semantic context. Recent attempts to infer this context, due to their reliance on heuristics and non-portable language features, are inherently brittle and incomplete. As business logic vulnerabilities constitute a majority (27/40) of the most dangerous software weaknesses in practice, this is a worrying blind spot of existing tools. In this paper, we tackle this challenge with ANOTA, a novel human-in-the-loop sanitizer framework. ANOTA introduces a lightweight, user-friendly annotation system that enables users to directly encode their domain-specific knowledge as lightweight annotations that define an application's intended behavior. A runtime execution monitor then observes program behavior, comparing it against the policies defined by the annotations, thereby identifying deviations that indicate vulnerabilities. To evaluate the effectiveness of ANOTA, we combine ANOTA with a state-of-the-art fuzzer and compare it against other popular bug finding methods compatible with the same targets. The results show that ANOTA+FUZZER outperforms them in terms of effectiveness. More specifically, ANOTA+FUZZER can successfully reproduce 43 known vulnerabilities, and discovered 22 previously unknown vulnerabilities (17 CVEs assigned) during the evaluation. These results demonstrate that ANOTA provides a practical and effective approach for uncovering complex business logic flaws often missed by traditional security testing techniques.

Meng Wang, Philipp G\"orz, Joschua Schilling, Keno Hassler, Liwei Guo, Thorsten Holz, Ali Abbasi• 2025

Related benchmarks

TaskDatasetResultRank
Vulnerability DetectionPygoat
TP16
7
Vulnerability DetectionFLASK
TP5
7
Vulnerability DetectionDSVW
TP10
7
Vulnerability DetectionVAmPI
TP4
7
Vulnerability DetectionAggregated Suite (Pygoat, FLASK, DSVW, VAmPI)
Precision100
7
Showing 5 of 5 rows

Other info

Follow for update