2011
DOI: 10.1002/stvr.450
|View full text |Cite
|
Sign up to set email alerts
|

Improving penetration testing through static and dynamic analysis

Abstract: SUMMARYPenetration testing is widely used to help ensure the security of web applications. Using penetration testing, testers discover vulnerabilities by simulating attacks on a target web application. To do this efficiently, testers rely on automated techniques that gather input vector information about the target web application and analyze the application's responses to determine whether an attack was successful. Techniques for performing these steps are often incomplete, which can leave parts of the web ap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(17 citation statements)
references
References 39 publications
0
17
0
Order By: Relevance
“…The software testing for venerability detection is mostly focused on test information collection, response analysis, improving test adequacy and accuracy, and performance evaluation [12,17]. Other related researches focus on the efficient generation of test data, recognition of test interface, and how to determine whether the actual output according with expectations [8,18] .…”
Section: Detection Methods Based On Software Testingmentioning
confidence: 99%
See 1 more Smart Citation
“…The software testing for venerability detection is mostly focused on test information collection, response analysis, improving test adequacy and accuracy, and performance evaluation [12,17]. Other related researches focus on the efficient generation of test data, recognition of test interface, and how to determine whether the actual output according with expectations [8,18] .…”
Section: Detection Methods Based On Software Testingmentioning
confidence: 99%
“…Parsing Java Script codes on the client-side can crawl pages in Ajax applications [31]. The crawled XSS vulnerabilities can be automatically repaired [32].Analyzing the source codes of Web applications may find more injection points than the crawling method [12].…”
Section: Key Technologies Of Xss Attack Detection Injection Point Anamentioning
confidence: 99%
“…Besides, SQLIA is difficult to detect and prevent as it has many types, approaches and various evading SQLIA detection and prevention techniques (Joshi & Geetha, 2014). Victims of SQLIA sometimes are not even aware of their information leakage until the time after SQLIA has been successfully executed (Halfond, Choudhary, & Orso, 2011).…”
Section: Concepts and Definitionmentioning
confidence: 99%
“…analyses static code and runtime behaviour to find bugs. Other approaches combine both approaches to find security vulnerabilities in web sites [26] and to debug and repair faults in Java programs [51].…”
Section: Related Workmentioning
confidence: 99%