Current state of research on cross-site scripting (XSS)–A systematic literature review

I Hydara, ABM Sultan, H Zulzalil… - Information and Software …, 2015‏ - Elsevier
Context Cross-site scripting (XSS) is a security vulnerability that affects web applications. It
occurs due to improper or lack of sanitization of user inputs. The security vulnerability …

Mitigating program security vulnerabilities: Approaches and challenges

H Shahriar, M Zulkernine - ACM Computing Surveys (CSUR), 2012‏ - dl.acm.org
Programs are implemented in a variety of languages and contain serious vulnerabilities
which might be exploited to cause security breaches. These vulnerabilities have been …

Systematic review of web application security development model

B Musa Shuaibu, N Md Norwawi, MH Selamat… - Artificial Intelligence …, 2015‏ - Springer
In recent years, web security has been viewed in the context of securing the web application
layer from attacks by unauthorized users. The vulnerabilities existing in the web application …

LDAP injection techniques

JM Alonso, R Bordon, M Beltran… - 2008 11th IEEE …, 2008‏ - ieeexplore.ieee.org
The increase in the number of databases accessed only by some applications has made
code injection attacks an important threat to almost any current system. If one of these …

Investigation and analysis of malware on websites

T Yagi, N Tanimoto, T Hariu… - 2010 12th IEEE …, 2010‏ - ieeexplore.ieee.org
We investigated the distribution of malware on websites by constructing web honeypots
carrying vulnerable web applications. With the diffusion of web services caused by the …

Applying dynamic separation of aspects to distributed systems security: a case study

M Garcı́a, D Llewellyn-Jones, F Ortin, M Merabti - IET Software, 2012‏ - IET
Distributed systems are commonly required to be flexible and scalable, as the number and
arrangement of their (potentially mobile) devices may easily change. Security in distributed …

Identifying security aspects in early development stages

T Okubo, H Tanaka - 2008 Third International Conference on …, 2008‏ - ieeexplore.ieee.org
Although aspect-oriented software development is regarded as a suitable way to build non-
functional requirements such as security concerns, there are few researches for identifying …

[PDF][PDF] Towards assisted remediation of security vulnerabilities

G Serme, AS De Oliveira, M Guarnieri… - The Sixth International …, 2012‏ - eurecom.eu
Security vulnerabilities are still prevalent in systems despite the existence of their
countermeasures for several decades. In order to detect the security vulnerabilities missed …

A combined approach to prevent SQL Injection Attacks

E Dogbe, R Millham, P Singh - 2013 Science and Information …, 2013‏ - ieeexplore.ieee.org
In order to adapt to changing business requirements, information systems are often migrated
to the Web but, in doing so, these systems often have their security vulnerabilities exposed …

Analysis of blacklist update frequency for countering malware attacks on websites

T Yagi, J Murayama, T Hariu, S Tsugawa… - IEICE Transactions …, 2014‏ - search.ieice.org
We proposes a method for determining the frequency for monitoring the activities of a
malware download site used for malware attacks on websites. In recent years, there has …