2010 IEEE International Conference on Web Services 2010
DOI: 10.1109/icws.2010.76
|View full text |Cite
|
Sign up to set email alerts
|

Benchmarking Vulnerability Detection Tools for Web Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
37
0
2

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 61 publications
(39 citation statements)
references
References 7 publications
0
37
0
2
Order By: Relevance
“…In the first case study the "Benchmark for SQL Injection Vulnerability Detection Tools" [18] was used to evaluate and compare the considered vulnerability detection techniques. The goal was to understand how different is the effectiveness of these techniques in web services environment.…”
Section: A Case #1: Benchmark For Vulnerability Detection Toolsmentioning
confidence: 99%
“…In the first case study the "Benchmark for SQL Injection Vulnerability Detection Tools" [18] was used to evaluate and compare the considered vulnerability detection techniques. The goal was to understand how different is the effectiveness of these techniques in web services environment.…”
Section: A Case #1: Benchmark For Vulnerability Detection Toolsmentioning
confidence: 99%
“…There are a few studies that have attempted to analyze the effectiveness of different countermeasures against WA attacks in laboratory environments [4][5][6]. Unfortunately, the difficulties of performing experiments on the topic in a representative manner have brought various constraints that delimit the value of their results for a decision maker in the industry.…”
Section: Introductionmentioning
confidence: 99%
“…In (Antunes and Vieira 2010) it was proposed a methodology to benchmark web services security scanner tools (in previous research works the same authors found out that the most used vulnerability scanners have different vulnerability coverage, meaning that they uncover different sets of vulnerabilities (M. Vieira, Antunes, and Madeira 2009)). They proposed a method to analyze the flaws and limitations of web application scanners by using one secure version and one insecure version of a custom-built web application.…”
Section: Security Benchmarking Initiativesmentioning
confidence: 99%