2013 35th International Conference on Software Engineering (ICSE) 2013
DOI: 10.1109/icse.2013.6606610
|View full text |Cite
|
Sign up to set email alerts
|

Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis

Abstract: Abstract-In previous work, we proposed a set of static attributes that characterize input validation and input sanitization code patterns. We showed that some of the proposed static attributes are significant predictors of web application vulnerabilities related to SQL injection and cross site scripting. Static attributes have the advantage of reflecting general properties of a program. Yet, dynamic attributes collected from execution traces may reflect more specific code characteristics that are complementary… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

2
46
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 81 publications
(48 citation statements)
references
References 19 publications
2
46
0
Order By: Relevance
“…On several occasions, the usage of static analysis offers a high false positive rate. Shar et al [12] employed the static analysis for addressing the nodes and dynamic analysis for determining the vulnerable nodes. However, the hybrid methodology espoused by them is marred by the false positive rate of the static analysis and the lack of precision in the dynamic analysis results.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…On several occasions, the usage of static analysis offers a high false positive rate. Shar et al [12] employed the static analysis for addressing the nodes and dynamic analysis for determining the vulnerable nodes. However, the hybrid methodology espoused by them is marred by the false positive rate of the static analysis and the lack of precision in the dynamic analysis results.…”
Section: Related Workmentioning
confidence: 99%
“…Although there are several methodologies employed for detecting XSS vulnerability [7,10,11,12,16,17], the threats of XSS continue to persist. Thus, the aim of this paper is to enhance the detection methodologies by eradicating the infeasible paths, thereby reducing the false positive rate of locating XSS vulnerability.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…On the other hand, [27] proposed an approach based on static analysis with GA on Java web applications. Their approach combines the detection approach from [26] and the removal approach from [25]. [27] approach detects XSS vulnerabilities with significant results as compared with the approach of [25].…”
Section: ) Crossover and Mutationmentioning
confidence: 99%
“…Hybrid analysis combines static and dynamic analyses as a better approach, but the combined approach was focused on to benefit from the two types of analyses (static and dynamic) [25]; nevertheless, it still has some problems in terms of the accuracy of its result, such as the training data.…”
Section: ) Crossover and Mutationmentioning
confidence: 99%