2012
DOI: 10.1007/s10664-012-9216-x
|View full text |Cite
|
Sign up to set email alerts
|

A case study on bypass testing of web applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…Lack of user input validation vulnerability (Offutt et al, 2014) occurs when a web application accepts input from a user without checking whether this input is valid or not. Therefore, web applications must include client-side and server-side validations that can reject invalid, unsanitised, manipulated or perturbed user inputs to ensure security quality attributes.…”
Section: Lack Of User Input Validation Vulnerabilitymentioning
confidence: 99%
See 2 more Smart Citations
“…Lack of user input validation vulnerability (Offutt et al, 2014) occurs when a web application accepts input from a user without checking whether this input is valid or not. Therefore, web applications must include client-side and server-side validations that can reject invalid, unsanitised, manipulated or perturbed user inputs to ensure security quality attributes.…”
Section: Lack Of User Input Validation Vulnerabilitymentioning
confidence: 99%
“…SWAT techniques attempt to inject such malicious inputs into a web application under test to determine whether these inputs are accepted or rejected by this application. The web applications security-based testing techniques found in the reviewed research papers are SQL injection testing (Lei et al, 2013), XSS testing (Bozic et al, 2015b), XML injection testing (Jan et al, 2019), bypass testing (Offutt et al, 2014), and penetration testing (Tian et al, 2012). Table 3 classifies the reviewed research papers according to the targeted vulnerability in each paper.…”
Section: Other Types Of Web Applications Testingmentioning
confidence: 99%
See 1 more Smart Citation
“…In related research, we have developed bypass testing [23,24] to send invalid data to web applications, bypassing some of the input validation. This is a stress testing approach that does not explore the kinds of interaction paths that ASM explores.…”
Section: Related Workmentioning
confidence: 99%
“…Yet, significant amount of failures is still being found [1]. That is due to poor engineering processes, unstandardised knowledge, and poor practices in software development and software testing processes.…”
Section: Problem Statementmentioning
confidence: 99%