[PDF][PDF] Atropos: Effective fuzzing of web applications for server-side vulnerabilities
Server-side web applications are still predominantly implemented in the PHP programming
language. Even nowadays, PHP-based web applications are plagued by many different …
language. Even nowadays, PHP-based web applications are plagued by many different …
VulEye: A novel graph neural network vulnerability detection approach for PHP application
Following advances in machine learning and deep learning processing, cyber security
experts are committed to creating deep intelligent approaches for automatically detecting …
experts are committed to creating deep intelligent approaches for automatically detecting …
{AnimateDead}: Debloating web applications using concolic execution
Year over year, modern web applications evolve to cater to the needs of many users and
support various runtime environments. The ever-growing need to appeal to as many users …
support various runtime environments. The ever-growing need to appeal to as many users …
URadar: Discovering Unrestricted File Upload Vulnerabilities via Adaptive Dynamic Testing
Y Chen, Y Li, Z Pan, Y Lu, J Chen… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Unrestricted file upload (UFU) vulnerabilities, especially unrestricted executable file upload
(UEFU) vulnerabilities, pose severe security risks to web servers. For instance, attackers can …
(UEFU) vulnerabilities, pose severe security risks to web servers. For instance, attackers can …
Serialdetector: Principled and practical exploration of object injection vulnerabilities for the web
The last decade has seen a proliferation of codereuse attacks in the context of web
applications. These attacks stem from Object Injection Vulnerabilities (OIV) enabling attacker …
applications. These attacks stem from Object Injection Vulnerabilities (OIV) enabling attacker …
HiddenCPG: large-scale vulnerable clone detection using subgraph isomorphism of code property graphs
A code property graph (CPG) is a joint representation of syntax, control flows, and data flows
of a target application. Recent studies have demonstrated the promising efficacy of …
of a target application. Recent studies have demonstrated the promising efficacy of …
Backporting security patches of web applications: A prototype design and implementation on injection vulnerability patches
Web vulnerabilities, especially injection-related ones, are popular among web application
frameworks (such as Word-Press and Piwigo), which can lead to severe consequences like …
frameworks (such as Word-Press and Piwigo), which can lead to severe consequences like …
Automated versus manual approach of web application penetration testing
N Singh, V Meherhomji… - 2020 11th International …, 2020 - ieeexplore.ieee.org
The main aim of this work is to find and explain certain scenarios that can demonstrate the
differences in automated and manual approaches for penetration testing. There are some …
differences in automated and manual approaches for penetration testing. There are some …
Ufuzzer: Lightweight detection of php-based unrestricted file upload vulnerabilities via static-fuzzing co-analysis
Unrestricted file upload vulnerabilities enable attackers to upload malicious scripts to a web
server for later execution. We have built a system, namely UFuzzer, to effectively and …
server for later execution. We have built a system, namely UFuzzer, to effectively and …
[PDF][PDF] FUSE: Finding File Upload Bugs via Penetration Testing.
An Unrestricted File Upload (UFU) vulnerability is a critical security threat that enables an
adversary to upload her choice of a forged file to a target web server. This bug evolves into …
adversary to upload her choice of a forged file to a target web server. This bug evolves into …