2017
DOI: 10.1007/978-3-319-62105-0_13
|View full text |Cite
|
Sign up to set email alerts
|

A Formal Approach to Exploiting Multi-stage Attacks Based on File-System Vulnerabilities of Web Applications

Abstract: Web applications require access to the file-system for many different tasks. When analyzing the security of a web application, security analysts should thus consider the impact that file-system operations have on the security of the whole application. Moreover, the analysis should take into consideration how file-system vulnerabilities might interact with other vulnerabilities leading an attacker to breach into the web application. In this paper, we first propose a classification of filesystem vulnerabilities,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 10 publications
(82 reference statements)
0
1
0
Order By: Relevance
“…The authors adopted threat models such as an intruder taking control over a website or a whole part of the network. -Mobster Tool: In [49], the authors introduced the MobSTer tool, which is a Model-based Security Testing Framework that may help security analysts in testing security aspects of WA. This framework combines model-checking procedures with the knowledge obtained from penetration testing guidelines and checklists.…”
Section: Model-based Testing and Formal Methods For Web Service Securitymentioning
confidence: 99%
“…The authors adopted threat models such as an intruder taking control over a website or a whole part of the network. -Mobster Tool: In [49], the authors introduced the MobSTer tool, which is a Model-based Security Testing Framework that may help security analysts in testing security aspects of WA. This framework combines model-checking procedures with the knowledge obtained from penetration testing guidelines and checklists.…”
Section: Model-based Testing and Formal Methods For Web Service Securitymentioning
confidence: 99%
“…El alcance específico de la seguridad debe estar claramente definido por los interesados en términos de los activos a los que se aplica la seguridad y las consecuencias contra las que se evalúa la seguridad (Nist, Mcevilley, & Oren, 2016) Con el aumento de las aplicaciones web disponibles y las características proporcionadas, se ha producido un aumento exponencial del número de aplicaciones web. Llegando a exponer datos privados y confidenciales, con compañías y usuarios que se dieron cuenta de que eran víctimas de un ataque (De Meo & Viganó, 2017).…”
Section: Introductionunclassified