2021
DOI: 10.32604/cmes.2021.010700
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid Security AssessmentMethodology forWeb Applications

Abstract: This study presents a methodology to evaluate and prevent security vulnerabilities issues for web applications. The analysis process is based on the use of techniques and tools that allow to perform security assessments of white box and black box, to carry out the security validation of a web application in an agile and precise way. The objective of the methodology is to take advantage of the synergies of semi-automatic static and dynamic security analysis tools and manual checks. Each one of the phases contem… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 42 publications
0
2
0
Order By: Relevance
“…The current advancement in programming improvement, the sundried methods for concealing noxious code (malware jumbling) by developers, adding hyper-availability in present society, makes malware investigation, analysis, identification, and classification develop into a real and increasingly complex problem to deal with nowadays. Android is an open-source operating system with over 1 billion users, covering many devices (smartphones, tablets, IoT, gadgets, and so on).The amount of confidential data presented across these devices (servers, smartphones, tablets, IoT, gadgets, and so on) boosts the complexity of attacks [1], which is a problem of concern to society. It becomes a priority to develop a method to analyze, detect, and classify malware on devices using the Android operating system.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…The current advancement in programming improvement, the sundried methods for concealing noxious code (malware jumbling) by developers, adding hyper-availability in present society, makes malware investigation, analysis, identification, and classification develop into a real and increasingly complex problem to deal with nowadays. Android is an open-source operating system with over 1 billion users, covering many devices (smartphones, tablets, IoT, gadgets, and so on).The amount of confidential data presented across these devices (servers, smartphones, tablets, IoT, gadgets, and so on) boosts the complexity of attacks [1], which is a problem of concern to society. It becomes a priority to develop a method to analyze, detect, and classify malware on devices using the Android operating system.…”
mentioning
confidence: 99%
“…The amount of confidential data presented across these devices (servers, smartphones, tablets, IoT, gadgets, and so on) boosts the complexity of attacks [1], which is a problem of concern to society. It becomes a priority to develop a method to analyze, detect, and classify malware on devices using the Android operating system.…”
mentioning
confidence: 99%