2005
DOI: 10.1109/tse.2005.36
|View full text |Cite
|
Sign up to set email alerts
|

Leveraging user-session data to support Web application testing

Abstract: Abstract-Web applications are vital components of the global information infrastructure, and it is important to ensure their dependability. Many techniques and tools for validating Web applications have been created, but few of these have addressed the need to test Web application functionality and none have attempted to leverage data gathered in the operation of Web applications to assist with testing. In this paper, we present several techniques for using user session data gathered as users operate Web appli… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
145
0
1

Year Published

2007
2007
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 187 publications
(150 citation statements)
references
References 23 publications
1
145
0
1
Order By: Relevance
“…Elmam et al proposed web application test techniques using session data [6]. The session data is gathered as users operate web applications.…”
Section: Related Workmentioning
confidence: 99%
“…Elmam et al proposed web application test techniques using session data [6]. The session data is gathered as users operate web applications.…”
Section: Related Workmentioning
confidence: 99%
“…User session testing is increasingly adopted for web application's testing (Di Lucca and Fasolino, 2006). It mainly focuses on selecting user session data such as sequence of user actions with the web application, which are recorded in web server logs (Elbaum et al, 2005, Akhunzada et al, 2015b. Collected user session data may contain significant redundancy, since common scenarios of application execution are achieved by the users.…”
Section: User Session Testingmentioning
confidence: 99%
“…Early techniques relied on developer-provided specifications [1,15,18], which does not fit well into the usage scenario of penetration testing, where oftentimes the vulnerabilities are found in IVs that are unknown or untested by the developers. Several techniques [6,7,16,19] use session data and user logs to identify relevant information about the monitored web applications. These techniques have limitations similar to those associated with web crawlers, as they can only analyze parts of a web application that have been visited.…”
Section: Related Workmentioning
confidence: 99%