The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2013 10th International Conference on Information Technology: New Generations 2013
DOI: 10.1109/itng.2013.97
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Cross-Site Scripting Vulnerability Using Concolic Testing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…This method [66], according to the researchers, is intended for JSP-based web-related applications and is a jCute concolic testing. They employ static analysis and real-time monitoring.…”
Section: Conflicts Of Interestmentioning
confidence: 99%
“…This method [66], according to the researchers, is intended for JSP-based web-related applications and is a jCute concolic testing. They employ static analysis and real-time monitoring.…”
Section: Conflicts Of Interestmentioning
confidence: 99%
“…• Verify Constraint or Pattern (VCP) without using models. This category of WAVD methods [9,23,54,55,57,59,62,67,72,75,82,83,91,94,105,109,110,115,118,119,121,126,130,151,152] begins by identifying constraints, patterns, or policies related to a specific vulnerability from source code, execution trace, or user inputs and then checks or monitors violations of the constraints to detect vulnerabilities or attacks. Unlike VCPM, the VCP approaches do not generate and use models in the process of constraint and pattern verification.…”
Section: The Classifications Of Wavd Approachesmentioning
confidence: 99%
“…Results comparison from BRC6 of I1 iterations with previous method [22] Figure 3 Results comparison from BRC6 of I2 iterations with previous method [22] Figure 4 Results comparison from BRC6 of I3 iterations with previous method [22]…”
Section: Figurementioning
confidence: 99%