An OWASP top ten driven survey on web application protection methods

OB Fredj, O Cheikhrouhou, M Krichen… - Risks and Security of …, 2021 - Springer
Web applications (WAs) are constantly evolving and deployed at broad scale. However, they
are exposed to a variety of attacks. The biggest challenge facing organizations is how to …

MobSTer: A model‐based security testing framework for web applications

M Peroli, F De Meo, L Viganò… - … Testing, Verification and …, 2018 - Wiley Online Library
Web applications have become one of the preferred means for users to perform a number of
crucial and security‐sensitive operations such as selling and buying goods or managing …

Model-based security testing of vehicle networks

F Sommer, R Kriesten, F Kargl - 2021 International Conference …, 2021 - ieeexplore.ieee.org
Modern vehicles consist of a large number of electronic information technology components,
which communicate with each other and external components. To protect vehicles against …

Design and User Study of a Constraint-based Framework for Business Logic Flaw Discovery

C Cheh, N Tay, B Chen - 2022 IEEE Secure Development …, 2022 - ieeexplore.ieee.org
Business logic flaws are common in web application security and pose a huge problem to
developers. While there are many tools that check application code for implementation-level …

From hindsight to foresight: Enhancing design artifacts for business logic flaw discovery

C Cheh, N Tay, B Chen - Proceedings of the 38th Annual Computer …, 2022 - dl.acm.org
Web applications have encroached on our lives, handling important tasks and sensitive
information. There are many tools that check application code for implementation-level …

A formal and automated approach to exploiting multi-stage attacks of web applications

F De Meo, L Viganò - Journal of Computer Security, 2020 - journals.sagepub.com
We propose a formal and automated approach that allows one to (i) reason about
vulnerabilities of web applications and (ii) combine multiple vulnerabilities for the …