[PDF][PDF] Atropos: Effective fuzzing of web applications for server-side vulnerabilities

E Güler, S Schumilo, M Schloegel, N Bars… - USENIX Security …, 2024 - usenix.org
Server-side web applications are still predominantly implemented in the PHP programming
language. Even nowadays, PHP-based web applications are plagued by many different …

VulEye: A novel graph neural network vulnerability detection approach for PHP application

C Lin, Y Xu, Y Fang, Z Liu - Applied Sciences, 2023 - mdpi.com
Following advances in machine learning and deep learning processing, cyber security
experts are committed to creating deep intelligent approaches for automatically detecting …

{AnimateDead}: Debloating web applications using concolic execution

BA Azad, R Jahanshahi, C Tsoukaladelis… - 32nd USENIX Security …, 2023 - usenix.org
Year over year, modern web applications evolve to cater to the needs of many users and
support various runtime environments. The ever-growing need to appeal to as many users …

URadar: Discovering Unrestricted File Upload Vulnerabilities via Adaptive Dynamic Testing

Y Chen, Y Li, Z Pan, Y Lu, J Chen… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Unrestricted file upload (UFU) vulnerabilities, especially unrestricted executable file upload
(UEFU) vulnerabilities, pose severe security risks to web servers. For instance, attackers can …

Serialdetector: Principled and practical exploration of object injection vulnerabilities for the web

M Shcherbakov, M Balliu - Network and Distributed Systems Security …, 2021 - diva-portal.org
The last decade has seen a proliferation of codereuse attacks in the context of web
applications. These attacks stem from Object Injection Vulnerabilities (OIV) enabling attacker …

HiddenCPG: large-scale vulnerable clone detection using subgraph isomorphism of code property graphs

S Wi, S Woo, JJ Whang, S Son - … of the ACM Web Conference 2022, 2022 - dl.acm.org
A code property graph (CPG) is a joint representation of syntax, control flows, and data flows
of a target application. Recent studies have demonstrated the promising efficacy of …

Backporting security patches of web applications: A prototype design and implementation on injection vulnerability patches

Y Shi, Y Zhang, T Luo, X Mao, Y Cao, Z Wang… - 31st USENIX Security …, 2022 - usenix.org
Web vulnerabilities, especially injection-related ones, are popular among web application
frameworks (such as Word-Press and Piwigo), which can lead to severe consequences like …

Automated versus manual approach of web application penetration testing

N Singh, V Meherhomji… - 2020 11th International …, 2020 - ieeexplore.ieee.org
The main aim of this work is to find and explain certain scenarios that can demonstrate the
differences in automated and manual approaches for penetration testing. There are some …

Ufuzzer: Lightweight detection of php-based unrestricted file upload vulnerabilities via static-fuzzing co-analysis

J Huang, J Zhang, J Liu, C Li, R Dai - Proceedings of the 24th …, 2021 - dl.acm.org
Unrestricted file upload vulnerabilities enable attackers to upload malicious scripts to a web
server for later execution. We have built a system, namely UFuzzer, to effectively and …

[PDF][PDF] FUSE: Finding File Upload Bugs via Penetration Testing.

T Lee, S Wi, S Lee, S Son - NDSS, 2020 - researchgate.net
An Unrestricted File Upload (UFU) vulnerability is a critical security threat that enables an
adversary to upload her choice of a forged file to a target web server. This bug evolves into …