2017 IEEE 9th International Conference on Communication Software and Networks (ICCSN) 2017
DOI: 10.1109/iccsn.2017.8230288
|View full text |Cite
|
Sign up to set email alerts
|

A static backward taint data analysis method for detecting web application vulnerabilities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…Many studies use static code analysis [14] in general and taint analysis [15] in particular to detect web application vulnerabilities. IDE plugins, such as [16], use static code analysis approaches to help developers identify vulnerabilities when writing their code.…”
Section: Methodsmentioning
confidence: 99%
“…Many studies use static code analysis [14] in general and taint analysis [15] in particular to detect web application vulnerabilities. IDE plugins, such as [16], use static code analysis approaches to help developers identify vulnerabilities when writing their code.…”
Section: Methodsmentioning
confidence: 99%
“…• Match Fingerprint with Elements Extracted from a Model (MFM). WAVD methods in this category [6,7,11,12,23,52,53,55,60,61,64,69,71,76,77,80,81,86,108,142,145,147,150] usually begin by deriving models, e.g., CFG, DDG, AST, browsing behavior models, navigation graphs, and navigation paths. The WAVD approaches then traverse the model to extract code elements to compare with known fingerprints.…”
Section: The Classifications Of Wavd Approachesmentioning
confidence: 99%
“…The WAVD approaches then traverse the model to extract code elements to compare with known fingerprints. For example, Yan et al [12] implemented a backward variable tracing algorithm to all trace variables along all paths in AST, CFG, CG for taint analysis, which determines whether sanitization functions have sanitized a variable before the value of the variable is used in sink functions. Dahse et al [61] also built AST, CFG, and DF first and then performed backward-directed taint analysis.…”
Section: The Classifications Of Wavd Approachesmentioning
confidence: 99%
See 2 more Smart Citations