2017
DOI: 10.1007/s10207-016-0359-4
|View full text |Cite
|
Sign up to set email alerts
|

Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0
2

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(20 citation statements)
references
References 27 publications
0
18
0
2
Order By: Relevance
“…As it is evident from different literatures, manual penetration testing method always provides cent precent of accuracy [18] and it is selected as the control environment for this research examination. Fig.…”
Section: Detection Results Comparisonmentioning
confidence: 99%
See 1 more Smart Citation
“…As it is evident from different literatures, manual penetration testing method always provides cent precent of accuracy [18] and it is selected as the control environment for this research examination. Fig.…”
Section: Detection Results Comparisonmentioning
confidence: 99%
“…If the response code is matched with 200 status, the program will forward the given URL to the crawling [18] step. Otherwise, an error message with "Host server is not available" will be displayed before quitting the program.…”
Section: Url Validationmentioning
confidence: 99%
“…[47][48][49] experimental results showed the proposed code parsing and reverse engineering algorithms are efficient in scraping data entry points (DEPs) and attack vectors from undertest web applications. In the meanwhile, [50][51][52][53][54][55][56][57][58][59][60]"s experimental results showed leveraging of searchbased testing technique, mutation testing technique, and genetic algorithm are effective in improving the attack coverage. Moreover, anomaly detection and information flow analysis by [8,9,27,28,31], and [61][62][63][64][65][66][67][68][69][70][71][72][73][74][75][76][77][78][79] are proven effective in detecting the web application vulnerability in either black box or white box testing environment.…”
Section: 3benchmarking the Algorithmsmentioning
confidence: 99%
“…On the other hand it is a common observation that website serve to be a prime target for attackers for the reason of being omnipresent , in-demand and having an incrementing user-base. [2]. With the increased demand of the web applications, bloggers and web service providers are taking more interest in implementing and utilizing the web applications [3].…”
Section: Introductionmentioning
confidence: 99%