Proceedings of the 3rd International Conference on Future Networks and Distributed Systems 2019
DOI: 10.1145/3341325.3342032
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Automated Web Application Security Vulnerabilities Testing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 20 publications
0
5
0
Order By: Relevance
“…Secure software coding challenges SSC is not as simple as it seems to be, various challenges are faced during this process. Some critical challenges involved in SSC are listed below [38][39][40][41][42][43][44][45][46][47][48][49][50] :…”
Section: 2mentioning
confidence: 99%
See 1 more Smart Citation
“…Secure software coding challenges SSC is not as simple as it seems to be, various challenges are faced during this process. Some critical challenges involved in SSC are listed below [38][39][40][41][42][43][44][45][46][47][48][49][50] :…”
Section: 2mentioning
confidence: 99%
“…SSC is not as simple as it seems to be, various challenges are faced during this process. Some critical challenges involved in SSC are listed below 38‐50 : Injection, Broken authentication and session management, Cross‐site scripting Insecure direct object reference, Security misconfiguration, Sensitive data exposure, Missing function level access control, Cross‐site request forgery, Using components with know vulnerabilities, Invalidated redirects and forwards, Data validation, Authentication, Session management, Authorization, Cryptography, Error handling, Logging, Security configuration, Network architecture. …”
Section: Motivation and Related Reviewmentioning
confidence: 99%
“…A vulnerability scanner is a software application that assesses security vulnerabilities in networks or host systems and creates a bunch of scan results that are frequently utilized to set vulnerability evaluation particularly during the process of development [7][8][9][10]. Usually, vulnerability scanner detects vulnerabilities that are originated from vendors, system administration activities, or general activities by users.…”
Section: 2vulnerability Scannermentioning
confidence: 99%
“…Kwiatkowska et al [6] highlighted the significance of each tired of the web, mainly security with its service point and sufficient security check at the service point. Touseef et al [7] proposed a complete study of web vulnerability measuring and recognizing relevant datasets. Khera et al [8] examined and presented the lifecycle of the VAPT process and VAPT tools.…”
Section: Related Workmentioning
confidence: 99%