Efficiency and effectiveness of web application vulnerability detection approaches: A review

B Zhang, J Li, J Ren, G Huang - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Most existing surveys and reviews on web application vulnerability detection (WAVD)
approaches focus on comparing and summarizing the approaches' technical details …

Toss a fault to your witcher: Applying grey-box coverage-guided mutational fuzzing to detect sql and command injection vulnerabilities

E Trickel, F Pagani, C Zhu, L Dresel… - … IEEE symposium on …, 2023 - ieeexplore.ieee.org
Black-box web application vulnerability scanners attempt to automatically identify
vulnerabilities in web applications without access to the source code. However, they do so …

[PDF][PDF] The approaches to quantify web application security scanners quality: a review

LK Seng, N Ithnin, SZM Said - International Journal of Advanced …, 2018 - eprints.utm.my
The web application security scanner is a computer program that assessed web application
security with penetration testing technique. The benefit of automated web application …

An empirical comparison of commercial and open‐source web vulnerability scanners

R Amankwah, J Chen, PK Kudjo… - Software: Practice and …, 2020 - Wiley Online Library
Web vulnerability scanners (WVSs) are tools that can detect security vulnerabilities in web
services. Although both commercial and open‐source WVSs exist, their vulnerability …

[HTML][HTML] Effective and scalable black-box fuzzing approach for modern web applications

A Alsaedi, A Alhuzali, O Bamasag - … of King Saud University-Computer and …, 2022 - Elsevier
Web applications' security is critical because we share sensitive data through them
frequently, which attracts attackers who exploit their vulnerabilities. Detecting and exploiting …

Improving Logging to Reduce Permission {Over-Granting} Mistakes

B Shen, T Shan, Y Zhou - 32nd USENIX Security Symposium (USENIX …, 2023 - usenix.org
Access control configurations are gatekeepers to block unwelcome access to sensitive data.
Unfortunately, system administrators (sysadmins) sometimes over-grant permissions when …

Multiview: Finding Blind Spots in {Access-Deny} Issues Diagnosis

B Shen, T Shan, Y Zhou - 32nd USENIX Security Symposium (USENIX …, 2023 - usenix.org
Access-deny issues are hard to fix because it implies both availability and security
requirements. On one hand, system administrators (sysadmins) need to make a change …

[HTML][HTML] BACAD: AI-based framework for detecting vertical broken access control attacks

A Anas, AA Alhelbawy, S El Gamal… - Egyptian Informatics …, 2024 - Elsevier
Abstract Vertical Broken Access Control (VBAC) vulnerability is one of the most commonly
identified issues in web applications, posing significant risks. Consequently, addressing this …

An automated framework for evaluating open-source web scanner vulnerability severity

R Amankwah, J Chen, PK Kudjo, BK Agyemang… - … Oriented Computing and …, 2020 - Springer
The inevitable use of web applications has resulted in increased exposure to security
vulnerabilities which are exploited by attackers each passing day. Fixing these …

An efficient algorithm and tool for detecting dangerous website vulnerabilities

HV Long, TA Tuan, D Taniar, NV Can… - … Journal of Web …, 2020 - inderscienceonline.com
Web applications are progressively develo** and applied in most aspects of life. However,
there exist a variety of dangerous website security vulnerabilities such as SQL injection and …