Efficiency and effectiveness of web application vulnerability detection approaches: A review

B Zhang, J Li, J Ren, G Huang - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Most existing surveys and reviews on web application vulnerability detection (WAVD)
approaches focus on comparing and summarizing the approaches' technical details …

Empirical analysis of security vulnerabilities in python packages

M Alfadel, DE Costa, E Shihab - Empirical Software Engineering, 2023 - Springer
Software ecosystems play an important role in modern software development, providing an
open platform of reusable packages that speed up and facilitate development tasks …

Systematic review analysis on SQLIA detection and prevention approaches

MS Aliero, KN Qureshi, MF Pasha, I Ghani… - Wireless Personal …, 2020 - Springer
SQL injection attack (SQLIA) is one of the most severe attacks that can be used against web
database driving applications. Attackers use SQLIA to get unauthorized access and perform …

DIAVA: a traffic-based framework for detection of SQL injection attacks and vulnerability analysis of leaked data

H Gu, J Zhang, T Liu, M Hu, J Zhou… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
SQL injection attack (SQLIA) is among the most common security threats to web-based
services that are deployed on cloud. By exploiting web software vulnerabilities, SQL …

Tabby: Automated gadget chain detection for java deserialization vulnerabilities

X Chen, B Wang, Z Jin, Y Feng, X Li… - 2023 53rd Annual …, 2023 - ieeexplore.ieee.org
Java is one of the preferred options of modern developers and has become increasingly
more prominent with the prevalence of the open-source culture. Thanks to the serialization …

Probing model signal-awareness via prediction-preserving input minimization

S Suneja, Y Zheng, Y Zhuang, JA Laredo… - Proceedings of the 29th …, 2021 - dl.acm.org
This work explores the signal awareness of AI models for source code understanding. Using
a software vulnerability detection use case, we evaluate the models' ability to capture the …

Understanding the quality of container security vulnerability detection tools

O Javed, S Toor - arXiv preprint arXiv:2101.03844, 2021 - arxiv.org
Virtualization enables information and communications technology industry to better
manage computing resources. In this regard, improvements in virtualization approaches …

An integrated approach for effective injection vulnerability analysis of web applications through security slicing and hybrid constraint solving

J Thome, LK Shar, D Bianculli… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Malicious users can attack Web applications by exploiting injection vulnerabilities in the
source code. This work addresses the challenge of detecting injection vulnerabilities in the …

[PDF][PDF] Broken authentication and session management vulnerability: a case study of web application

MM Hassan, SS Nipa, M Akter, R Haque… - Int. J. Simul. Syst. Sci …, 2018 - ijssst.info
Web applications have extensively taken over the roles of atomization and enhancement of
prevailing solutions. It also provides different services to the multiple users of the application …

[HTML][HTML] A hybrid XSS attack (HYXSSA) based on fusion approach: Challenges, threats and implications in cybersecurity

D Korać, B Damjanović, D Simić, KKR Choo - Journal of King Saud …, 2022 - Elsevier
Cross-site scripting (XSS) attacks have been extensively studied in the literature, although
mitigating such attacks remain a challenge for cyber defenders. In this paper, we survey the …