Securing web applications from injection and logic vulnerabilities: Approaches and challenges

G Deepa, PS Thilagam - Information and Software Technology, 2016 - Elsevier
Context: Web applications are trusted by billions of users for performing day-to-day activities.
Accessibility, availability and omnipresence of web applications have made them a prime …

Mitigating program security vulnerabilities: Approaches and challenges

H Shahriar, M Zulkernine - ACM Computing Surveys (CSUR), 2012 - dl.acm.org
Programs are implemented in a variety of languages and contain serious vulnerabilities
which might be exploited to cause security breaches. These vulnerabilities have been …

Why Johnny can't pentest: An analysis of black-box web vulnerability scanners

A Doupé, M Cova, G Vigna - … Conference on Detection of Intrusions and …, 2010 - Springer
Black-box web vulnerability scanners are a class of tools that can be used to identify security
issues in web applications. These tools are often marketed as “point-and-click pentesting” …

Enemy of the state: A {state-aware}{black-box} web vulnerability scanner

A Doupé, L Cavedon, C Kruegel, G Vigna - 21st USENIX Security …, 2012 - usenix.org
Black-box web vulnerability scanners are a popular choice for finding security vulnerabilities
in web applications in an automated fashion. These tools operate in a point-and-shoot …

[PDF][PDF] Toward automated detection of logic vulnerabilities in web applications

V Felmetsger, L Cavedon, C Kruegel… - 19th USENIX Security …, 2010 - usenix.org
Web applications are the most common way to make services and data available on the
Internet. Unfortunately, with the increase in the number and complexity of these applications …

XSS-GUARD: precise dynamic prevention of cross-site scripting attacks

P Bisht, VN Venkatakrishnan - Detection of Intrusions and Malware, and …, 2008 - Springer
This paper focuses on defense mechanisms for cross-site scripting attacks, the top threat on
web applications today. It is believed that input validation (or filtering) can effectively prevent …

CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks

P Bisht, P Madhusudan… - ACM Transactions on …, 2010 - dl.acm.org
SQL injection attacks are one of the top-most threats for applications written for the Web.
These attacks are launched through specially crafted user inputs, on Web applications that …

Using static analysis for Ajax intrusion detection

A Guha, S Krishnamurthi, T Jim - … of the 18th international conference on …, 2009 - dl.acm.org
We present a static control-flow analysis for JavaScript programs running in a web browser.
Our analysis tackles numerous challenges posed by modern web applications including …

Static Detection of {Second-Order} Vulnerabilities in Web Applications

J Dahse, T Holz - 23rd USENIX Security Symposium (USENIX Security …, 2014 - usenix.org
Web applications evolved in the last decades from simple scripts to multi-functional
applications. Such complex web applications are prone to different types of security …

A survey on server-side approaches to securing web applications

X Li, Y Xue - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
Web applications are one of the most prevalent platforms for information and service
delivery over the Internet today. As they are increasingly used for critical services, web …