2017 International Conference on Promising Electronic Technologies (ICPET) 2017
DOI: 10.1109/icpet.2017.11
|View full text |Cite
|
Sign up to set email alerts
|

Detection and Removing Cross Site Scripting Vulnerability in PHP Web Application

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 14 publications
0
7
0
Order By: Relevance
“…To answer RQ2, we collected time consumption/memory consumption (TC/MC) data presented in the evaluation and information about whether some steps of the method are automatic (Auto) to measure the efficiency of the WAVD approaches. For measuring effectiveness, in addition to popular metrics [156] listed in Table B.1 in Appendix B, such as false positive rate (FPR), false negative rate (FNR), true negative rate (TNR), true positive rate (TPR), precision (P), accuracy (Acc), Recall (R), F-measure/F1-score, code coverage (CC) [124], detection rate (DR) (i.e., number of attacks detected as attacks / number of attacks [131,150]), metrics such as p-value and effect size [20], area under the receiver operating characteristic curve (AUC) [14], and fitness [123,131], are also presented in the evaluation of the WAVD approaches and are therefore summarized and compared. Seventy-eight out of the 105 studies focus on injection vulnerabilities, probably because injection vulnerabilities are top listed in OWASP 2013 and OWASP 2017.…”
Section: Results Of Rq2mentioning
confidence: 99%
See 1 more Smart Citation
“…To answer RQ2, we collected time consumption/memory consumption (TC/MC) data presented in the evaluation and information about whether some steps of the method are automatic (Auto) to measure the efficiency of the WAVD approaches. For measuring effectiveness, in addition to popular metrics [156] listed in Table B.1 in Appendix B, such as false positive rate (FPR), false negative rate (FNR), true negative rate (TNR), true positive rate (TPR), precision (P), accuracy (Acc), Recall (R), F-measure/F1-score, code coverage (CC) [124], detection rate (DR) (i.e., number of attacks detected as attacks / number of attacks [131,150]), metrics such as p-value and effect size [20], area under the receiver operating characteristic curve (AUC) [14], and fitness [123,131], are also presented in the evaluation of the WAVD approaches and are therefore summarized and compared. Seventy-eight out of the 105 studies focus on injection vulnerabilities, probably because injection vulnerabilities are top listed in OWASP 2013 and OWASP 2017.…”
Section: Results Of Rq2mentioning
confidence: 99%
“…More studies are needed to re-evaluate and compare existing WAVD approaches using test suites with known types and numbers of vulnerabilities. Code coverage(CC) [124], Detection rate(DR) [131,150], P-value and effect size [20], AUC [14], Fitness [123,131] TP: The prediction result is vulnerable, which is actually vulnerable. FP: The prediction result is vulnerable, which is actually benign.…”
Section: Discussionmentioning
confidence: 99%
“…Finally, adequate escaping mechanisms of OWASP are identified by matching the OWASP XSS prevention rules and instrumented making use of the ESAPI API 7 . Marashdih and Zaaba [100] proposed an approach for the detection and removal of RXSS and SXSS vulnerabilities from PHP web applications. Static taint-analysis of Pixy tool [17] is used to examine the source code of web application pages and generate their correspondent control-flow graphs.…”
Section: Xss Vulnerability Detection and Removal Techniquesmentioning
confidence: 99%
“…a) Stored XSS (AKA Persistent or Type I) Stored XSS [7] all around happens when a client input is put away on the goal server, for instance, in a message gathering, in a database, visitor log, statement field and many more. What's more, after that a harmed individual can recoup the set away data from the web application.…”
Section: ) Security Misconfigurationmentioning
confidence: 99%
“…c) DOM Based XSS (AKA Type-0) In DOM Based XSS [7], the whole corrupted information spill out of source to sink happens in the program, that is, the wellspring of the information is in the DOM, the sink is comparatively in the DOM, and this information stream has not evacuated the program.…”
Section: ) Security Misconfigurationmentioning
confidence: 99%