2016
DOI: 10.1007/978-3-319-45243-2_34
|View full text |Cite
|
Sign up to set email alerts
|

A Solution for Automatically Malicious Web Shell and Web Application Vulnerability Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 4 publications
0
5
0
Order By: Relevance
“…Le et al [47,48] combined taint analysis and pattern matching to detect webshells. Taint analysis is performed to divide the code into tokens during the lexical analysis phase.…”
Section: Static Methodsmentioning
confidence: 99%
“…Le et al [47,48] combined taint analysis and pattern matching to detect webshells. Taint analysis is performed to divide the code into tokens during the lexical analysis phase.…”
Section: Static Methodsmentioning
confidence: 99%
“…These known vulnerable pieces of code are called fingerprint data in [85]. Le et al [86] analyzed the token list of each file to identify potentially dangerous functions, and Shahriar et al [87] applied information retrieval methods to search known method calls that are related to object injection vulnerabilities. For approaches (e.g., [61]) using taint analysis, the sensitive sources, sinks, or sanitization points always come from analyzing known vulnerable code.…”
Section: 21mentioning
confidence: 99%
“…• Match Fingerprint with Elements Extracted from a Model (MFM). WAVD methods in this category [6,7,11,12,23,52,53,55,60,61,64,69,71,76,77,80,81,86,108,142,145,147,150] usually begin by deriving models, e.g., CFG, DDG, AST, browsing behavior models, navigation graphs, and navigation paths. The WAVD approaches then traverse the model to extract code elements to compare with known fingerprints.…”
Section: The Classifications Of Wavd Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…Due to the high usage of webshell in cyberattacks, there has been much previous research in this eld. But most researchers focus on the contents of suspicious les [4][5][6] or POST contents in HTTP requests [7] and thus ignore features in a sequence of web server logs. With the development of encryption and obfuscation technology [8,9], it is quite di cult to detect webshell in thousands of website source les, but when we only need to deal with the sequence of several elds in the web logs without considering complex text processing, the problem becomes much simpler.…”
Section: Introductionmentioning
confidence: 99%