[PDF][PDF] Improving the Detection and Identification of Template Engines for Large-Scale Template Injection Scanning

M Hildebrand - hackmanit.de
In this thesis, the currently most relevant template engines are enumerated and intentionally
implemented in a manner vulnerable to template injection in a playground with various …

A Survey of the Overlooked Dangers of Template Engines

L Pisu, D Maiorca, G Giacinto - arXiv preprint arXiv:2405.01118, 2024 - arxiv.org
Template engines play a pivotal role in modern web application development, facilitating the
dynamic rendering of content, products, and user interfaces. Nowadays, template engines …

Remote Code Execution from {SSTI} in the Sandbox: Automatically Detecting and Exploiting Template Escape Bugs

Y Zhao, Y Zhang, M Yang - 32nd USENIX Security Symposium (USENIX …, 2023 - usenix.org
Template engines are widely used in web applications to ease the development of user
interfaces. The powerful capabilities provided by the template engines can be abused by …

Experimental toolkit for manipulating executable packing

A D'Hondt, CHB Van Ouytsel, A Legay - … on Risks and Security of Internet …, 2023 - Springer
Executable packing is a well-known problematic especially in the field of malware analysis.
It often consists in applying compression or encryption to a binary file and embedding a stub …

Developing an in house vulnerability scanner for detecting Template Injection, XSS, and DOM-XSS vulnerabilities

M Hauger, S Jensen - 2023 - uia.brage.unit.no
Web applications are becoming an essential part of today's digital world. However, with the
increase in the usage of web applications, security threats have also become more …

How to choose interesting points for template attacks more effectively?

G Fan, Y Zhou, H Zhang, D Feng - … 2014, Beijing, China, December 16-17 …, 2015 - Springer
Template attacks are widely accepted to be the most powerful side-channel attacks from an
information theoretic point of view. For template attacks to be practical, one needs to choose …

[图书][B] Systematic Techniques for Finding and Preventing Script Injection Vulnerabilities

P Saxena - 2012 - search.proquest.com
Computer users trust web applications to protect their financial transactions and online
identities from attacks by cyber criminals. However, web applications today are riddled with …

Template aware coverage: Taking coverage analysis to the next level

R Gal, E Kermany, B Saleh, A Ziv, M Behm… - Proceedings of the 54th …, 2017 - dl.acm.org
Understanding the relationship between coverage and test-templates (a generic term we
use to describe the inputs for the random stimuli generator) is an important layer in …

Hydra: Feedback-driven black-box exploitation of injection vulnerabilities

M Leithner, B Garn, DE Simos - Information and Software Technology, 2021 - Elsevier
Context: Injection vulnerabilities remain an omnipresent threat to web application security.
These issues arise when user-supplied input is included in commands constructed by the …

Templates Hub for research communities

B Esteban Sanchis, C Laures… - … Better Software for …, 2023 - publikationen.bibliothek.kit.edu
Software engineering best practices favour the creation of better quality projects, where
similar projects should originate from similar pre-defined layout, also called software …