2012 IEEE Sixth International Conference on Software Security and Reliability 2012
DOI: 10.1109/sere.2012.38
|View full text |Cite
|
Sign up to set email alerts
|

Semi-Automatic Security Testing of Web Applications from a Secure Model

Abstract: Abstract-Web applications are a major target of attackers. The increasing complexity of such applications and the subtlety of today's attacks make it very hard for developers to manually secure their web applications. Penetration testing is considered an art; the success of a penetration tester in detecting vulnerabilities mainly depends on his skills. Recently, model-checkers dedicated to security analysis have proved their ability to identify complex attacks on web-based security protocols. However, bridging… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
52
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
6
2
2

Relationship

1
9

Authors

Journals

citations
Cited by 38 publications
(55 citation statements)
references
References 18 publications
0
52
0
Order By: Relevance
“…Fault models provide abstract descriptions for specific things that can go wrong in a certain domain [32]. Several examples of fault models have been proposed (e.g., for access control policies [22], or for specific concurrency or security faults [7,32]). Our work is the first to define such notion for mixed discrete-continuous Stateflows and apply it using meta-heuristic search.…”
Section: Related Workmentioning
confidence: 99%
“…Fault models provide abstract descriptions for specific things that can go wrong in a certain domain [32]. Several examples of fault models have been proposed (e.g., for access control policies [22], or for specific concurrency or security faults [7,32]). Our work is the first to define such notion for mixed discrete-continuous Stateflows and apply it using meta-heuristic search.…”
Section: Related Workmentioning
confidence: 99%
“…Their method targets XSS vulnerabilities. The work of Büchler et al [45,46] motivates the use of a secure model formulated in ASLan++. 2 This model then is mutated to introduce typical vulnerabilities in web applications, and subsequently passed to a model-checker which yields attack traces.…”
Section: Web Application Security Testingmentioning
confidence: 99%
“…If a violation occurs, it is executed against a real implementation. Büchler et al [13] proposed an approach that assumes (i) a model is given (ii) and the model is secure. Then they propose to mutate the model by injecting vulnerabilities and to use a model checker for detecting violations.…”
Section: C) Model-based Security Testingmentioning
confidence: 99%