2013
DOI: 10.1016/j.infsof.2013.08.001
|View full text |Cite
|
Sign up to set email alerts
|

Comparison and integration of genetic algorithms and dynamic symbolic execution for security testing of cross-site scripting vulnerabilities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(10 citation statements)
references
References 20 publications
0
10
0
Order By: Relevance
“…Although there are several methodologies employed for detecting XSS vulnerability [7,10,11,12,16,17], the threats of XSS continue to persist. Thus, the aim of this paper is to enhance the detection methodologies by eradicating the infeasible paths, thereby reducing the false positive rate of locating XSS vulnerability.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Although there are several methodologies employed for detecting XSS vulnerability [7,10,11,12,16,17], the threats of XSS continue to persist. Thus, the aim of this paper is to enhance the detection methodologies by eradicating the infeasible paths, thereby reducing the false positive rate of locating XSS vulnerability.…”
Section: Related Workmentioning
confidence: 99%
“…GAs work as a client application in which the population evolves toward overall fitness even though individuals perish. GAs follow natural evolution mechanisms (e.g., mutation, crossover, and selection), which evaluate the fittest, to solve problems [17]. The elementary genetic algorithm steps are converted into a pseudocode (Fig.…”
Section: Detection Of Xss Vulnerabilitymentioning
confidence: 99%
“…WB services are more prone to cyber attacks due to their public access. Attacker or hackers sometimes breach this security by changing the original mapping of software, which in some instances causes a great loss [9,11].…”
Section: Introductionmentioning
confidence: 99%
“…enterprise security application programming interface whose purpose is incorporating security into existing and new WBs. Finally, researchers have broad consensus over OWASP top 10 regarding the main critical security vulnerabilities of WBs [3,4,7,8,11,12,13,14,17].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation