A survey on developer-centred security

M Tahaei, K Vaniea - 2019 IEEE European Symposium on …, 2019 - ieeexplore.ieee.org
Software developers are key players in the security ecosystem as they produce code that
runs on millions of devices. Yet we continue to see insecure code being developed and …

Input validation vulnerabilities in web applications: Systematic review, classification, and analysis of the current state-of-the-art

FF Fadlalla, HT Elshoush - IEEE Access, 2023 - ieeexplore.ieee.org
In recent years, huge increase in attacks and data breaches is noticed. Most of the attacks
are performed and focused on the vulnerabilities related to web applications. Hence …

Toss a fault to your witcher: Applying grey-box coverage-guided mutational fuzzing to detect sql and command injection vulnerabilities

E Trickel, F Pagani, C Zhu, L Dresel… - … IEEE symposium on …, 2023 - ieeexplore.ieee.org
Black-box web application vulnerability scanners attempt to automatically identify
vulnerabilities in web applications without access to the source code. However, they do so …

Black widow: Blackbox data-driven web scanning

B Eriksson, G Pellegrino… - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Modern web applications are an integral part of our digital lives. As we put more trust in web
applications, the need for security increases. At the same time, detecting vulnerabilities in …

Tchecker: Precise static inter-procedural analysis for detecting taint-style vulnerabilities in php applications

C Luo, P Li, W Meng - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
PHP applications provide various interfaces for end-users to interact with on the Web. They
thus are prone to taint-style vulnerabilities such as SQL injection and cross-site scripting. For …

Link: Black-box detection of cross-site scripting vulnerabilities using reinforcement learning

S Lee, S Wi, S Son - Proceedings of the ACM Web Conference 2022, 2022 - dl.acm.org
Black-box web scanners have been a prevalent means of performing penetration testing to
find reflected cross-site scripting (XSS) vulnerabilities. Unfortunately, off-the-shelf black-box …

{JAW}: Studying client-side {CSRF} with hybrid property graphs and declarative traversals

S Khodayari, G Pellegrino - 30th USENIX Security Symposium (USENIX …, 2021 - usenix.org
Client-side CSRF is a new type of CSRF vulnerability where the adversary can trick the
client-side JavaScript program to send a forged HTTP request to a vulnerable target site by …

Deemon: Detecting CSRF with dynamic analysis and property graphs

G Pellegrino, M Johns, S Koch, M Backes… - Proceedings of the 2017 …, 2017 - dl.acm.org
Cross-Site Request Forgery (CSRF) vulnerabilities are a severe class of web vulnerabilities
that have received only marginal attention from the research and security testing …

{SoK}: State of the Krawlers–Evaluating the Effectiveness of Crawling Algorithms for Web Security Measurements

A Stafeev, G Pellegrino - 33rd USENIX Security Symposium (USENIX …, 2024 - usenix.org
Web crawlers are tools widely used in web security measurements whose performance and
impact have been limitedly studied so far. In this paper, we bridge this gap. Starting from the …

Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis

P Li, W Meng, M Zhang, C Wang… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
Symbolic execution for dynamic web applications is challenging due to their multilingual
nature. Prior solutions often fall short in limited syntax support and excessive engineering …