2018
DOI: 10.1088/1742-6596/1015/4/042033
|View full text |Cite
|
Sign up to set email alerts
|

Statistics of software vulnerability detection in certification testing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0
1

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 9 publications
0
3
0
1
Order By: Relevance
“…The OWASP Top Ten project brings together the most important vulnerability categories. There are several works that confirm web applications tested did not pass the OWASP Top Ten project [2][3][4]. Web applications in organizations and companies connected through the Internet and Intranets imply that they are used to develop any type of business, but at the same time they have become a valuable target of a great variety of attacks by exploiting the design, implementation or operation vulnerabilities, included in the OWASP Top Ten project, to obtain some type of economic advantage, privileged information, denial, extortion, etc.…”
Section: Web Applications Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…The OWASP Top Ten project brings together the most important vulnerability categories. There are several works that confirm web applications tested did not pass the OWASP Top Ten project [2][3][4]. Web applications in organizations and companies connected through the Internet and Intranets imply that they are used to develop any type of business, but at the same time they have become a valuable target of a great variety of attacks by exploiting the design, implementation or operation vulnerabilities, included in the OWASP Top Ten project, to obtain some type of economic advantage, privileged information, denial, extortion, etc.…”
Section: Web Applications Securitymentioning
confidence: 99%
“…Taking into account statistics of security vulnerabilities reported by several studies [2][3][4], the most adequate test bench for using SAST, DAST and IAST tools is OWASP benchmark project [14]. This benchmark is an open source web application in Java language deployed in Apache Tomcat.…”
Section: Benchmark Selectionmentioning
confidence: 99%
“…exploitation and vulnerability prevention, has become a hot topic in the world of information security [1]- [4]. In response to cyberattacks, an effective method is to use a vulnerability database that is more complete, and the vulnerability database is faster to update and monitor the information assets under its jurisdiction, eliminating hidden dangers and ensuring information security [5]- [7].…”
Section: Introductionmentioning
confidence: 99%
“…Первостепенными задачами экспертного сообщества при этом являются: (функциональная структура, объединяющая более 6000 специалистов из разных военных ведомств и командований) под названием «Завоевание и удержание господства в киберпространстве» 28 . Важное значение в этом контексте имеет также решение НАТО о возможности задействовать статью 5 Вашингтонского договора, предусматривающую коллективную самооборону, в случае кибернападения, хотя при этом подчеркивается, что не любое кибернападение приведет к задействованию статьи 5 29 . Следовательно, в США существует комплексная стратегическая программа обеспечения и поддержания информационного превосходства путем повышения своих возможностей и всестороннего снижения способностей других акторов.…”
unclassified