2010
DOI: 10.1016/j.jss.2010.07.007
|View full text |Cite
|
Sign up to set email alerts
|

Perturbation-based user-input-validation testing of web applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0
1

Year Published

2012
2012
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(18 citation statements)
references
References 7 publications
0
13
0
1
Order By: Relevance
“…Generally, to a great extent, the effect of both code-based criteria and methods relies on the evolutionary of features or the sufficiency of the collection produced in the test for detecting the XSS vulnerabilities in the source code. Among the disadvantages of this method, lack of preventing the incorrect positive valid inputs can be mentioned [10].…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Generally, to a great extent, the effect of both code-based criteria and methods relies on the evolutionary of features or the sufficiency of the collection produced in the test for detecting the XSS vulnerabilities in the source code. Among the disadvantages of this method, lack of preventing the incorrect positive valid inputs can be mentioned [10].…”
Section: Literature Reviewmentioning
confidence: 99%
“…(Fiddler, Burp Proxy, Tamperie) tools, allow the developers edit the input in the web pages directly, but they do not give them any help with respect to production of different input tests. In the following table, the features of these tools are compared with each other [10].…”
Section: Tools Of Scanning the Vulnerability Of Web Pagesmentioning
confidence: 99%
“…For example, an invalid email address can be a string without "@" or with some invalid characters, such as "$", "&" and "=" [12].…”
Section: Approach Overviewmentioning
confidence: 99%
“…Specification-based IVT methods [54,55,76,77,104] generate test cases with the aim of exercising various combinations of valid/invalid input conditions stated in specifications. Since input validation implemented in client-side scripts can be easily bypassed by attackers, Offutt et al…”
Section: Input Validation Testingmentioning
confidence: 99%
“…[104] proposed a bypass testing technique that specifically checks the adequacy of input validation implemented in server-side scripts. To avoid the sole dependency on specifications, Li et al [77] analyzed input fields and their surrounding texts in HTML pages to infer valid input conditions.…”
Section: Input Validation Testingmentioning
confidence: 99%