2018
DOI: 10.1007/978-3-030-03577-8_49
|View full text |Cite
|
Sign up to set email alerts
|

Modeling the OWASP Most Critical WEB Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 1 publication
0
4
0
Order By: Relevance
“…Secure software coding challenges SSC is not as simple as it seems to be, various challenges are faced during this process. Some critical challenges involved in SSC are listed below [38][39][40][41][42][43][44][45][46][47][48][49][50] :…”
Section: 2mentioning
confidence: 99%
See 1 more Smart Citation
“…Secure software coding challenges SSC is not as simple as it seems to be, various challenges are faced during this process. Some critical challenges involved in SSC are listed below [38][39][40][41][42][43][44][45][46][47][48][49][50] :…”
Section: 2mentioning
confidence: 99%
“…SSC is not as simple as it seems to be, various challenges are faced during this process. Some critical challenges involved in SSC are listed below 38‐50 : Injection, Broken authentication and session management, Cross‐site scripting Insecure direct object reference, Security misconfiguration, Sensitive data exposure, Missing function level access control, Cross‐site request forgery, Using components with know vulnerabilities, Invalidated redirects and forwards, Data validation, Authentication, Session management, Authorization, Cryptography, Error handling, Logging, Security configuration, Network architecture. …”
Section: Motivation and Related Reviewmentioning
confidence: 99%
“…OWASP concerns providing impartial, practical information about security in web applications to individuals, corporations, universities, government agencies, and other organizations worldwide. Many open source security-related tools (e.g., Sonar) and current research (e.g., [2]) on web application security use OWASP as a definitive reference. Hence, we consider the reliability of this project as a reasonable assumption.…”
Section: A Assumptionsmentioning
confidence: 99%
“…As the complexity of software systems grows, new vulnerabilities emerge. Increased networking and system complexity stress out the requirement for securing the systems [1], [2], [3]. System security should be managed with a proactive way instead of focusing on putting out fires [1].…”
Section: Introductionmentioning
confidence: 99%