Securing web applications from injection and logic vulnerabilities: Approaches and challenges
Context: Web applications are trusted by billions of users for performing day-to-day activities.
Accessibility, availability and omnipresence of web applications have made them a prime …
Accessibility, availability and omnipresence of web applications have made them a prime …
Mitigating program security vulnerabilities: Approaches and challenges
Programs are implemented in a variety of languages and contain serious vulnerabilities
which might be exploited to cause security breaches. These vulnerabilities have been …
which might be exploited to cause security breaches. These vulnerabilities have been …
Why Johnny can't pentest: An analysis of black-box web vulnerability scanners
Black-box web vulnerability scanners are a class of tools that can be used to identify security
issues in web applications. These tools are often marketed as “point-and-click pentesting” …
issues in web applications. These tools are often marketed as “point-and-click pentesting” …
Enemy of the state: A {state-aware}{black-box} web vulnerability scanner
Black-box web vulnerability scanners are a popular choice for finding security vulnerabilities
in web applications in an automated fashion. These tools operate in a point-and-shoot …
in web applications in an automated fashion. These tools operate in a point-and-shoot …
[PDF][PDF] Toward automated detection of logic vulnerabilities in web applications
Web applications are the most common way to make services and data available on the
Internet. Unfortunately, with the increase in the number and complexity of these applications …
Internet. Unfortunately, with the increase in the number and complexity of these applications …
XSS-GUARD: precise dynamic prevention of cross-site scripting attacks
This paper focuses on defense mechanisms for cross-site scripting attacks, the top threat on
web applications today. It is believed that input validation (or filtering) can effectively prevent …
web applications today. It is believed that input validation (or filtering) can effectively prevent …
CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks
SQL injection attacks are one of the top-most threats for applications written for the Web.
These attacks are launched through specially crafted user inputs, on Web applications that …
These attacks are launched through specially crafted user inputs, on Web applications that …
Using static analysis for Ajax intrusion detection
We present a static control-flow analysis for JavaScript programs running in a web browser.
Our analysis tackles numerous challenges posed by modern web applications including …
Our analysis tackles numerous challenges posed by modern web applications including …
Static Detection of {Second-Order} Vulnerabilities in Web Applications
J Dahse, T Holz - 23rd USENIX Security Symposium (USENIX Security …, 2014 - usenix.org
Web applications evolved in the last decades from simple scripts to multi-functional
applications. Such complex web applications are prone to different types of security …
applications. Such complex web applications are prone to different types of security …
A survey on server-side approaches to securing web applications
Web applications are one of the most prevalent platforms for information and service
delivery over the Internet today. As they are increasingly used for critical services, web …
delivery over the Internet today. As they are increasingly used for critical services, web …