Efficiency and effectiveness of web application vulnerability detection approaches: A review

B Zhang, J Li, J Ren, G Huang - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Most existing surveys and reviews on web application vulnerability detection (WAVD)
approaches focus on comparing and summarizing the approaches' technical details …

Static-Analysis-Based Solutions to Security Challenges in Cloud-Native Systems: Systematic Mapping Study

MS Rahaman, A Islam, T Cerny, S Hutton - Sensors, 2023 - mdpi.com
Security is a significant priority for cloud-native systems, regardless of the system size and
complexity. Therefore, one must utilize a set of defensive mechanisms or controls to protect …

An SMT solver for regular expressions and linear arithmetic over string length

M Berzish, M Kulczynski, F Mora, F Manea… - … on Computer Aided …, 2021 - Springer
We present a novel length-aware solving algorithm for the quantifier-free first-order theory
over regex membership predicate and linear arithmetic over string length. We implement …

Security analysis of permission re-delegation vulnerabilities in Android apps

BF Demissie, M Ceccato, LK Shar - Empirical Software Engineering, 2020 - Springer
The Android platform facilitates reuse of app functionalities by allowing an app to request an
action from another app through inter-process communication mechanism. This feature is …

Towards more efficient methods for solving regular-expression heavy string constraints

M Berzish, JD Day, V Ganesh, M Kulczynski… - Theoretical Computer …, 2023 - Elsevier
Widespread use of string solvers in the formal analysis of string-heavy programs has led to a
growing demand for more efficient and reliable techniques which can be applied in this …

Z3str4: A multi-armed string solver

F Mora, M Berzish, M Kulczynski, D Nowotka… - Formal Methods: 24th …, 2021 - Springer
We present Z3str4, a new high-performance string SMT solver for a rich quantifier-free first-
order theory of strings and length constraints. These kinds of constraints have found …

A frictionless and secure user authentication in web-based premium applications

RF Olanrewaju, BUI Khan, MA Morshidi, F Anwar… - Ieee …, 2021 - ieeexplore.ieee.org
By and large, authentication systems employed for web-based applications primarily utilize
conventional username and password-based schemes, which can be compromised easily …

Automated detection of software performance antipatterns in Java-based applications

C Trubiani, R Pinciroli, A Biaggi… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The detection of performance issues in Java-based applications is not trivial since many
factors concur to poor performance, and software engineers are not sufficiently supported for …

ZaligVinder: A generic test framework for string solvers

M Kulczynski, F Manea, D Nowotka… - Journal of Software …, 2023 - Wiley Online Library
The increased interest in string solving in the recent years has made it very hard to identify
the right tool to address a particular user's purpose. Firstly, there is a multitude of string …

The power of string solving: simplicity of comparison

M Kulczynski, F Manea, D Nowotka… - Proceedings of the IEEE …, 2020 - dl.acm.org
The increased interest in string solving in the recent years has made it very hard to identify
the right tool to address a particular user's purpose. Firstly, there is a multitude of string …