2011 5th Latin-American Symposium on Dependable Computing 2011
DOI: 10.1109/ladc.2011.14
|View full text |Cite
|
Sign up to set email alerts
|

Benchmarking the Security of Web Serving Systems Based on Known Vulnerabilities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…Vulnerabilities numbers regarding Apache and Wordpress are slightly different than the ones presented previously since data gathering was performed earlier (Mendes, Duraes, and Madeira 2011). Note that some of the components targeted in the previous case study (Apache and IIS) were also covered in this one.…”
Section: Benchmarking the Security Of Web Serving Systems Based On Knmentioning
confidence: 88%
“…Vulnerabilities numbers regarding Apache and Wordpress are slightly different than the ones presented previously since data gathering was performed earlier (Mendes, Duraes, and Madeira 2011). Note that some of the components targeted in the previous case study (Apache and IIS) were also covered in this one.…”
Section: Benchmarking the Security Of Web Serving Systems Based On Knmentioning
confidence: 88%
“…(viii) Insecure deserialization: manipulating the inputs of a web application by deserializing it, modifying it, and serializing it again to compromise the web application [17]. (ix) Using components with known vulnerabilities: stop updating the used component in a web application allows attackers to exploit its known vulnerabilities; this type of vulnerability is found in abundance, especially in CMS web applications [18]. (x) Insufficient logging and monitoring refer to the lack of logging and monitoring mechanisms and techniques, which allow attackers to find and exploit without being detected [19].…”
Section: Related Workmentioning
confidence: 99%
“…These scenarios can be divided in web-based applications and systems , web services [34][35][36][37][38][39] network protocols and devices [11,14,[40][41][42][43][44][45][46][47][48][49][50][51][52], software and desktop applications [61], and process control system [62]. Figure 4 shows the different target scenarios that have a diversity in relation to the number of studies, and as mentioned before, most of the studies are related to web-based applications, network devices, and protocols contexts.…”
Section: Rq2-what Are the Target-scenarios In Pentest?mentioning
confidence: 99%