2015 7th Conference on Information and Knowledge Technology (IKT) 2015
DOI: 10.1109/ikt.2015.7288798
|View full text |Cite
|
Sign up to set email alerts
|

A sound framework for dynamic prevention of Local File Inclusion

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
2
2
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…FIGURE 14: Exploit RFI and execute payload from attacker server [182] State-of-the-art research of File Inclusion Solutions A prevention technique presented by Tajbakhsh and Bagherzadeh [183], called AntiLFIer, prevents local file inclusion vulnerability in PHP language. This framework is written in Java and work by only allowing to include PHP scripts that are locally located in the root folder or subfolder related to the web site.…”
Section: • Local File Inclusion(lfi)mentioning
confidence: 99%
“…FIGURE 14: Exploit RFI and execute payload from attacker server [182] State-of-the-art research of File Inclusion Solutions A prevention technique presented by Tajbakhsh and Bagherzadeh [183], called AntiLFIer, prevents local file inclusion vulnerability in PHP language. This framework is written in Java and work by only allowing to include PHP scripts that are locally located in the root folder or subfolder related to the web site.…”
Section: • Local File Inclusion(lfi)mentioning
confidence: 99%
“…To counteract the threat of LFI, Tajbakhsh et al introduced in [15] a method to dynamically prevent local file inclusion (LFI) by attackers in web applications. They used PHP to describe the vulnerability and prevent it.…”
Section: Background and Literature Reviewmentioning
confidence: 99%
“…Then, the attacker includes the log file to execute a malicious code. An alternate log poisoning method discussed in [15] is performing the attack using emails. An attacker may find access to email files on the server and try to send an email containing malicious code.…”
Section: Background and Literature Reviewmentioning
confidence: 99%
“…In the publication Tajbakhsh and Bagherzadeh (2015), conducted a short survey on static and dynamic code analysis, thereby proposing a framework to prevent malicious files from hackers dynamically. The results show that the proposed framework can prevent FI quite effectively.…”
Section: Other Vulnerabilitiesmentioning
confidence: 99%