Securing web applications from injection and logic vulnerabilities: Approaches and challenges

G Deepa, PS Thilagam - Information and Software Technology, 2016 - Elsevier
Context: Web applications are trusted by billions of users for performing day-to-day activities.
Accessibility, availability and omnipresence of web applications have made them a prime …

Stram: Measuring the trustworthiness of computer-based systems

JH Cho, S Xu, PM Hurley, M Mackay… - ACM Computing …, 2019 - dl.acm.org
Various system metrics have been proposed for measuring the quality of computer-based
systems, such as dependability and security metrics for estimating their performance and …

Automated dynamic firmware analysis at scale: a case study on embedded web interfaces

A Costin, A Zarras, A Francillon - Proceedings of the 11th ACM on Asia …, 2016 - dl.acm.org
Embedded devices are becoming more widespread, interconnected, and web-enabled than
ever. However, recent studies showed that embedded devices are far from being secure …

Toss a fault to your witcher: Applying grey-box coverage-guided mutational fuzzing to detect sql and command injection vulnerabilities

E Trickel, F Pagani, C Zhu, L Dresel… - … IEEE symposium on …, 2023 - ieeexplore.ieee.org
Black-box web application vulnerability scanners attempt to automatically identify
vulnerabilities in web applications without access to the source code. However, they do so …

Security testing: A survey

M Felderer, M Büchler, M Johns, AD Brucker… - Advances in …, 2016 - Elsevier
Identifying vulnerabilities and ensuring security functionality by security testing is a widely
applied measure to evaluate and improve the security of software. Due to the openness of …

Hackers vs. testers: A comparison of software vulnerability discovery processes

D Votipka, R Stevens, E Redmiles, J Hu… - … IEEE Symposium on …, 2018 - ieeexplore.ieee.org
Identifying security vulnerabilities in software is a critical task that requires significant human
effort. Currently, vulnerability discovery is often the responsibility of software testers before …

Model-based vulnerability testing for web applications

F Lebeau, B Legeard, F Peureux… - 2013 IEEE Sixth …, 2013 - ieeexplore.ieee.org
This paper deals with an original approach to automate Model-Based Vulnerability Testing
(MBVT) for Web applications, which aims at improving the accuracy and precision of …

Enemy of the state: A {state-aware}{black-box} web vulnerability scanner

A Doupé, L Cavedon, C Kruegel, G Vigna - 21st USENIX Security …, 2012 - usenix.org
Black-box web vulnerability scanners are a popular choice for finding security vulnerabilities
in web applications in an automated fashion. These tools operate in a point-and-shoot …

An observational investigation of reverse {Engineers'} processes

D Votipka, S Rabin, K Micinski, JS Foster… - 29th USENIX Security …, 2020 - usenix.org
Reverse engineering is a complex process essential to software-security tasks such as
vulnerability discovery and malware analysis. Significant research and engineering effort …

A systematic literature review on the characteristics and effectiveness of web application vulnerability scanners

S Alazmi, DC De Leon - IEEE Access, 2022 - ieeexplore.ieee.org
Web applications have been a significant target for successful security breaches in the last
few years. They are currently secured, as a primary method, by searching for their …