Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure Systems 2010
DOI: 10.1145/1809100.1809110
|View full text |Cite
|
Sign up to set email alerts
|

Towards security testing with taint analysis and genetic algorithms

Abstract: Cross site scripting is considered the major threat to the security of web applications. Removing vulnerabilities from existing web applications is a manual expensive task that would benefit from some level of automatic assistance. Static analysis represents a valuable support for security review, by suggesting candidate vulnerable points to be checked manually. However, potential benefits are quite limited when too many false positives, safe portions of code classified as vulnerable, are reported.In this pape… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
33
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 40 publications
(33 citation statements)
references
References 15 publications
0
33
0
Order By: Relevance
“…With regards to the PHP web application, Andrea and Mariano [11] recommended a methodology to locate reflected XSS vulnerability without doing away with it. This methodology was further enhanced by Moataz and Fakhreldin www.ijacsa.thesai.org [10] for determining all three kinds of XSS vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…With regards to the PHP web application, Andrea and Mariano [11] recommended a methodology to locate reflected XSS vulnerability without doing away with it. This methodology was further enhanced by Moataz and Fakhreldin www.ijacsa.thesai.org [10] for determining all three kinds of XSS vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%
“…This methodology was further enhanced by Moataz and Fakhreldin www.ijacsa.thesai.org [10] for determining all three kinds of XSS vulnerabilities. However, the methodology by Andrea and Mariano [11] intends to locate only reflected XSS vulnerability without putting the genetic mutation operator to its best use. On the other hand, the methodology by Moataz and Fakhreldin [10] further enhanced the one offered by Andrea and Mariano [11] by utilising the database of XSS patterns for revealing the probable XSS vulnerabilities: stored, reflected, and DOMbased XSS.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations