2009 International Conference on Software Testing Verification and Validation 2009
DOI: 10.1109/icst.2009.26
|View full text |Cite
|
Sign up to set email alerts
|

Penetration Testing with Improved Input Vector Identification

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 40 publications
(17 citation statements)
references
References 18 publications
0
17
0
Order By: Relevance
“…Huang et al developed one of the first tools for black-box analysis of security vulnerabilities [16]. Other tools were developed to improve black-box web vulnerability scanners [2,15,20], and attempts were made to evaluate the capabilities of open-source and commercial black-box web vulnerability scanners [4,9,14,24,25]. Unlike black-box web vulnerability scanners, we did not fuzz the web applications, instead, we passively analyzed web applications to understand the prevalence of EARs on the Internet.…”
Section: Related Workmentioning
confidence: 99%
“…Huang et al developed one of the first tools for black-box analysis of security vulnerabilities [16]. Other tools were developed to improve black-box web vulnerability scanners [2,15,20], and attempts were made to evaluate the capabilities of open-source and commercial black-box web vulnerability scanners [4,9,14,24,25]. Unlike black-box web vulnerability scanners, we did not fuzz the web applications, instead, we passively analyzed web applications to understand the prevalence of EARs on the Internet.…”
Section: Related Workmentioning
confidence: 99%
“…The reflected and stored XSS attacks in the context of PHP and Java can be detected by inspecting the execution [17]. The lack of input validation on the client side, which may cause operation space explosion problem, can be automatically discovered in Java Script running space [7].…”
Section: Detection Methods Based On Symbolic Executionmentioning
confidence: 99%
“…The software testing for venerability detection is mostly focused on test information collection, response analysis, improving test adequacy and accuracy, and performance evaluation [12,17]. Other related researches focus on the efficient generation of test data, recognition of test interface, and how to determine whether the actual output according with expectations [8,18] .…”
Section: Detection Methods Based On Software Testingmentioning
confidence: 99%
“…White-box techniques usually resort to taint-analyses to identify which user inputs can flow into query statements [13,12,6,1,25,16,17]. The main limitations of these techniques are that they require access to the server side code, and are also bound to specific programming languages.…”
Section: Detection or Prevention Of Sql Injectionsmentioning
confidence: 99%