2022 14th International Conference on Computational Intelligence and Communication Networks (CICN) 2022
DOI: 10.1109/cicn56167.2022.10008276
|View full text |Cite
|
Sign up to set email alerts
|

A Study of XXE Attacks Prevention Using XML Parser Configuration

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 9 publications
0
1
0
Order By: Relevance
“…Then, we send this request to the Burp Suite [160], a tool commonly used in web application testing, in order to further analyze We observe that the application processes the data in XML format. We examine the applicability of an XXE injection attack [162], where the attacker has the ability to interfere with data processing and perform unwanted actions.…”
Section: B Phase 2: Risk Verification Via Penetration Testingmentioning
confidence: 99%
“…Then, we send this request to the Burp Suite [160], a tool commonly used in web application testing, in order to further analyze We observe that the application processes the data in XML format. We examine the applicability of an XXE injection attack [162], where the attacker has the ability to interfere with data processing and perform unwanted actions.…”
Section: B Phase 2: Risk Verification Via Penetration Testingmentioning
confidence: 99%
“…2) XEE could impact system behaviour and data confidentiality, potentially influencing system response times and memory utilization [15].…”
Section: A Dataset Generationmentioning
confidence: 99%