2012 Ninth International Conference on Information Technology - New Generations 2012
DOI: 10.1109/itng.2012.167
|View full text |Cite
|
Sign up to set email alerts
|

Automated Security Analysis of Dynamic Web Applications through Symbolic Code Execution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
25
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 37 publications
(25 citation statements)
references
References 6 publications
0
25
0
Order By: Relevance
“…Finally, we are aware of numerous literature work that address the issue of mitigation SQLI and XSS vulnerabilities through black box testing [7][8][9][10], static analysis [29][30][31][32] and runtime checking [34][35][36]. These approaches can be complementary to our approach by utilizing the results from these approaches to plug-in to our proposed fuzzy logic-based risk assessment framework.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, we are aware of numerous literature work that address the issue of mitigation SQLI and XSS vulnerabilities through black box testing [7][8][9][10], static analysis [29][30][31][32] and runtime checking [34][35][36]. These approaches can be complementary to our approach by utilizing the results from these approaches to plug-in to our proposed fuzzy logic-based risk assessment framework.…”
Section: Related Workmentioning
confidence: 99%
“…al. (2012) [9] used symbolic execution and string analysis technique. It improve precision by approximated the string values that may appear at sensitive link.…”
Section: B Limitation Of Standard Php Sanitization Functionmentioning
confidence: 99%
“…A number of approaches rely on taint-based static analysis [4,29] which are often dependent on string analysis algorithms and suffer from runtime overhead and false positive warning at the server-side. In contrast to all these approaches, we put the burden of detecting SQLI attacks at the client-side with a priori information sent by the server-side.…”
Section: Related Workmentioning
confidence: 99%
“…If attack inputs can be detected early at the browse side, then it could be thwarted early by not forwarding the malicious inputs to the server-side for further processing. This could bring two benefits: adding an extra protection layer on top of server-side solutions (e.g., secure coding [9,31], code generation [33], dynamic analysis [4,29]) and working as a complementary approach to other known existing black-box level solutions (e.g., security scanner tools [14,15,19,28,32]). However, there are challenges to develop a client-side SQLI attack detection approach.…”
Section: Introductionmentioning
confidence: 99%