2019
DOI: 10.1007/s10664-019-09707-8
|View full text |Cite|
|
Sign up to set email alerts
|

Search-based multi-vulnerability testing of XML injections in web applications

Abstract: Modern web applications often interact with internal web services, which are not directly accessible to users. However, malicious user inputs can be used to exploit security vulnerabilities in web services through the application front-ends. Therefore, testing techniques have been proposed to reveal security flaws in the interactions with back-end web services, e.g., XML Injections (XMLi). Given a potentially malicious message between a web application and web services, search-based techniques have been used t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(18 citation statements)
references
References 59 publications
0
17
0
Order By: Relevance
“…A vulnerability scanner is a software application that assesses security vulnerabilities in networks or host systems and creates a bunch of scan results that are frequently utilized to set vulnerability evaluation particularly during the process of development [7][8][9][10]. Usually, vulnerability scanner detects vulnerabilities that are originated from vendors, system administration activities, or general activities by users.…”
Section: 2vulnerability Scannermentioning
confidence: 99%
“…A vulnerability scanner is a software application that assesses security vulnerabilities in networks or host systems and creates a bunch of scan results that are frequently utilized to set vulnerability evaluation particularly during the process of development [7][8][9][10]. Usually, vulnerability scanner detects vulnerabilities that are originated from vendors, system administration activities, or general activities by users.…”
Section: 2vulnerability Scannermentioning
confidence: 99%
“…Table I reports that 3 out of the 16 studies have applied EAs within the context of SQL injection, 6 have applied them within the context of cross-site scripting, and 7 have applied them to other areas of Web Security. Of the 7 studies applying EAs to other areas of Web Security 3 focus on spam email [25], [27], [28], 1 focuses on XML injection [29], 1 targets published vulnerabilities in a server program [30], 1 considers denial-of-service attacks [26], and 1 generates CAPTCHAs [24].…”
Section: Rq2: For What Purposes Have Eas Been Applied Within Web Security?mentioning
confidence: 99%
“…Researchers have proposed various testing techniques to find vulnerabilities in front-end web applications [1,2,6,8,10,11,18], and their validation and sanitization routines in particular. Whitebox techniques (e.g., [6,18]) have been used in the literature to detect various types of vulnerabilities, such as SQL Injection and Cross-site Scripting.…”
Section: Introductionmentioning
confidence: 99%
“…These techniques require that the source code (or bytecode) of the web applications (both front-end and internal services) is available to the tester, that the internal working can be observed through instrumentation, and are language dependent. Instead, black-box techniques [1,2,8,10,11] identify vulnerabilities by inspecting the user-supplied inputs and the output generated by web applications. Note that there is no one-to-one mapping between user inputs and test output because input are processed and transformed by the SUT.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation