2014 14th International Conference on Quality Software 2014
DOI: 10.1109/qsic.2014.50
|View full text |Cite
|
Sign up to set email alerts
|

W-VST: A Testbed for Evaluating Web Vulnerability Scanner

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…Recall 79 is the number of correctly detected vulnerabilities represented as a proportion of all the known vulnerabilities (including those that should have been detected by the tool but were not). The formula for the recall is given in Equation .…”
Section: Empirical Studymentioning
confidence: 99%
“…Recall 79 is the number of correctly detected vulnerabilities represented as a proportion of all the known vulnerabilities (including those that should have been detected by the tool but were not). The formula for the recall is given in Equation .…”
Section: Empirical Studymentioning
confidence: 99%
“…The measurement metric of the number of true negatives illustrates the benign cross-site scripting vulnerabilities that a web application security scanner has successfully detected [27]. According to the experimental outcome of Figure 4, current web application security scanners only manage to detect cross-site scripting in some test-beds, which have simple business logic and without the authentication scheme.…”
Section: The Number Of True Negativesmentioning
confidence: 99%
“…The measurement metric of false positive illustrates fake cross-site scripting vulnerabilities yielded by the web application security scanners [27]. Figure 4 shows selected web application security scanners had produced false positive results while scanning the test-beds.…”
Section: The Number Of False Positivesmentioning
confidence: 99%
“…The experiment was conducted by configured the scanners to scan selected vulnerable web applications. Summing up experimental results of [6,7,18,22,23,26,30,34,[37][38][39][40][41][42][43][44][45][46], web application security scanners not only tends to generate false alarm, the coverage issue is quite concerning in automated web application penetration testing. Besides this, web application security scanners are exceptionally good in detecting reflected cross-site scripting and SQL injection.…”
Section: 2clarifying Scanners Strengths and Limitationsmentioning
confidence: 99%