[PDF][PDF] Analysis of security testing techniques

OB Tauqeer, S Jan, AO Khadidos… - … Automation & Soft …, 2021 - pdfs.semanticscholar.org
In the past decades, a significant increase has been observed in cyberattacks on the web-
based systems used for financial purposes. Such individual systems often contain security …

On combining static, dynamic and interactive analysis security testing tools to improve owasp top ten security vulnerability detection in web applications

F Mateo Tudela, JR Bermejo Higuera… - Applied Sciences, 2020 - mdpi.com
Featured Application This document provides a complete comparative study of how different
types of security analysis tools,(static, interactive and dynamic) can combine to obtain the …

DLint: Dynamically checking bad coding practices in JavaScript

L Gong, M Pradel, M Sridharan, K Sen - Proceedings of the 2015 …, 2015 - dl.acm.org
JavaScript has become one of the most popular programming languages, yet it is known for
its suboptimal design. To effectively use JavaScript despite its design flaws, developers try to …

An overview of penetration testing

CT Phong, WQ Yan - International Journal of Digital Crime and …, 2014 - igi-global.com
Penetration testing is an effort to attack a system using similar techniques and tools adopted
by real hackers. The ultimate goal of penetration testing is to call to light as many existing …

Software vulnerability detection methodology combined with static and dynamic analysis

S Kim, RYC Kim, YB Park - Wireless Personal Communications, 2016 - Springer
Software vulnerability is the attack surface. Therefore, vulnerabilities innate in software
should be detected for software security assurance. Vulnerability detection method can be …

Secured e-payment system based on automated authentication data and iterated salted hash algorithm

A Al Farawn, HD Rjeib, NS Ali… - … Electronics and Control …, 2020 - telkomnika.uad.ac.id
Electronic payment has been considered as one of the most significant and convenient
applications of modern electronic services e-University compared to traditional methods that …

Development of a System Vulnerability Analysis Tool for Assessment of Complex Mission Critical Systems

M Tassava, C Kolodjski, J Straub - arxiv preprint arxiv:2306.04280, 2023 - arxiv.org
A system vulnerability analysis technique (SVAT) for complex mission critical systems
(CMCS) was developed in response to the need to be able to conduct penetration testing on …

Distributed attack deployment capability for modern automated penetration testing

J Hance, J Milbrath, N Ross, J Straub - Computers, 2022 - mdpi.com
Cybersecurity is an ever-changing landscape. The threats of the future are hard to predict
and even harder to prepare for. This paper presents work designed to prepare for the …

Attack model based penetration test for SQL injection vulnerability

W Tian, JF Yang, J Xu, GN Si - 2012 IEEE 36th annual …, 2012 - ieeexplore.ieee.org
The penetration test is a crucial way to enhance the security of web applications. Improving
accuracy is the core issue of the penetration test research. The test case is an important …

[PDF][PDF] Protection web applications using real-time technique to detect structured query language injection attacks

NS Ali, AS Shibghatullah - International journal of computer …, 2016 - portal.arid.my
At present, Web applications have been used for most of our life activities increasingly, and
they affected by Structured Query Language Injection Attacks (SQLIAs). This attack is a …