2013 8th International Workshop on Automation of Software Test (AST) 2013
DOI: 10.1109/iwast.2013.6595794
|View full text |Cite
|
Sign up to set email alerts
|

XSS pattern for attack modeling in testing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
13
0
3

Year Published

2014
2014
2019
2019

Publication Types

Select...
3
3
2

Relationship

3
5

Authors

Journals

citations
Cited by 20 publications
(17 citation statements)
references
References 10 publications
1
13
0
3
Order By: Relevance
“…Establishing similar vectors with help of deterministic finite state machine algorithm to compare with attack vector of the multiple mode to improve the quality of detection method. The whole detection method use some steps, which are establishing skip list feature library, regulating script, using MD5 encoding and converting long integer, pre-screening attack vectors, judging attack vectors, to make up entire modular cross-site scripting attack detection framework [14]. We use this framework and the existing general XSS detection methods for comparative experiment.…”
Section: Resultsmentioning
confidence: 99%
“…Establishing similar vectors with help of deterministic finite state machine algorithm to compare with attack vector of the multiple mode to improve the quality of detection method. The whole detection method use some steps, which are establishing skip list feature library, regulating script, using MD5 encoding and converting long integer, pre-screening attack vectors, judging attack vectors, to make up entire modular cross-site scripting attack detection framework [14]. We use this framework and the existing general XSS detection methods for comparative experiment.…”
Section: Resultsmentioning
confidence: 99%
“…Technical details about the implementation and technical realization of the approach are demonstrated in further detail in previous works of the authors [20], [21], [4].…”
Section: Test Execution Methodsmentioning
confidence: 99%
“…The technique for test case execution in this paper is built upon former works of the authors from [20] and [21]. They describe a method called attack pattern-based testing, which is meant to execute test cases automatically against a SUT.…”
Section: Related Workmentioning
confidence: 99%
“…The authors from [4] define attack patterns in form of UML statecharts in order to test web applications against cross-site scripting attacks. First they specify manually an adaptable XSS attack pattern model and implement Java functions, which are called from within the model once the execution takes place.…”
Section: Related Workmentioning
confidence: 99%
“…This paper takes the technique from [4], which elaborates a modelbased testing approach for testing of web applications. The difference to other model-based approaches is the fact, that we do not use a model of the SUT to derive test cases but take as a model the definition of attack patterns from [12], where such a construct is specified by a goal, preconditions, actions and postconditions.…”
Section: Attack Pattern-based Testingmentioning
confidence: 99%