2020
DOI: 10.1109/tse.2018.2844343
|View full text |Cite
|
Sign up to set email alerts
|

An Integrated Approach for Effective Injection Vulnerability Analysis of Web Applications Through Security Slicing and Hybrid Constraint Solving

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 23 publications
(19 citation statements)
references
References 63 publications
0
18
0
1
Order By: Relevance
“…RegEx-Collected is a set of 22425 instances taken from existing benchmarks with the purpose of evaluating the performance of solvers against real-world regex instances. This benchmark includes all instances from the AppScan [41], BanditFuzz, 5 JOACO [38], Kaluza [33], Norn [3], Sloth [21], Stranger [40], and Z3str3-regression [8] benchmarks in which at least one regex membership constraint appears. 6 No additional restrictions are placed on which instances were chosen besides the presence of at least one regex membership predicate.…”
Section: Benchmarksmentioning
confidence: 99%
“…RegEx-Collected is a set of 22425 instances taken from existing benchmarks with the purpose of evaluating the performance of solvers against real-world regex instances. This benchmark includes all instances from the AppScan [41], BanditFuzz, 5 JOACO [38], Kaluza [33], Norn [3], Sloth [21], Stranger [40], and Z3str3-regression [8] benchmarks in which at least one regex membership constraint appears. 6 No additional restrictions are placed on which instances were chosen besides the presence of at least one regex membership predicate.…”
Section: Benchmarksmentioning
confidence: 99%
“…This can be done by modeling string operations and solving constraints on string values. In future work, we plan to combine our genetic algorithm-based test generator with a string constraint solving technique such as Thome et al (2020) for more effective test generation.…”
Section: Test Generationmentioning
confidence: 99%
“…There are different variants of the existing researchbased solution towards securing web-applications reported viz. security assessment using fuzzy logic and analytical hierarchy process [13] [14], usage of filter for identifying injection attacks [15], detection of intrusion using machine learning [16], adoption of hybrid constraint solving for detection of attacks [17], and visualization-based tools for security monitoring [18]. Irrespective of different variants of the research-based solution towards securing web applications, the commercial web applications used in enterprises still encounter vulnerability issues.…”
Section: Introductionmentioning
confidence: 99%