Securing web applications from injection and logic vulnerabilities: Approaches and challenges

G Deepa, PS Thilagam - Information and Software Technology, 2016 - Elsevier
Context: Web applications are trusted by billions of users for performing day-to-day activities.
Accessibility, availability and omnipresence of web applications have made them a prime …

A survey on server-side approaches to securing web applications

X Li, Y Xue - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
Web applications are one of the most prevalent platforms for information and service
delivery over the Internet today. As they are increasingly used for critical services, web …

Z3-str: A z3-based string solver for web application analysis

Y Zheng, X Zhang, V Ganesh - Proceedings of the 2013 9th Joint …, 2013 - dl.acm.org
Analyzing web applications requires reasoning about strings and non-strings cohesively.
Existing string solvers either ignore non-string program behavior or support limited set of …

Radiatus: a shared-nothing server-side web architecture

R Cheng, W Scott, P Ellenbogen, J Howell… - Proceedings of the …, 2016 - dl.acm.org
Web applications are a frequent target of successful attacks. In most web frameworks, the
damage is amplified by the fact that application code is responsible for security enforcement …

Rozzle: De-cloaking internet malware

C Kolbitsch, B Livshits, B Zorn… - 2012 IEEE Symposium …, 2012 - ieeexplore.ieee.org
JavaScript-based malware attacks have increased in recent years and currently represent a
signicant threat to the use of desktop computers, smartphones, and tablets. While static and …

S3: A symbolic string solver for vulnerability detection in web applications

MT Trinh, DH Chu, J Jaffar - Proceedings of the 2014 ACM SIGSAC …, 2014 - dl.acm.org
Motivated by the vulnerability analysis of web programs which work on string inputs, we
present S3, a new symbolic string solver. Our solver employs a new algorithm for a …

SQLiGoT: Detecting SQL injection attacks using graph of tokens and SVM

D Kar, S Panigrahi, S Sundararajan - Computers & Security, 2016 - Elsevier
SQL injection attacks have been predominant on web databases since the last 15 years.
Exploiting input validation flaws, attackers inject SQL code through the front-end of websites …

Efficiency and effectiveness of web application vulnerability detection approaches: A review

B Zhang, J Li, J Ren, G Huang - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Most existing surveys and reviews on web application vulnerability detection (WAVD)
approaches focus on comparing and summarizing the approaches' technical details …

Scriptless attacks: stealing the pie without touching the sill

M Heiderich, M Niemietz, F Schuster, T Holz… - Proceedings of the …, 2012 - dl.acm.org
Due to their high practical impact, Cross-Site Scripting (XSS) attacks have attracted a lot of
attention from the security community members. In the same way, a plethora of more or less …

[PDF][PDF] {NAVEX}: Precise and scalable exploit generation for dynamic web applications

A Alhuzali, R Gjomemo, B Eshete… - 27th USENIX Security …, 2018 - usenix.org
Modern multi-tier web applications are composed of several dynamic features, which make
their vulnerability analysis challenging from a purely static analysis perspective. We …