A survey of dynamic analysis and test generation for JavaScript

E Andreasen, L Gong, A Møller, M Pradel… - ACM Computing …, 2017 - dl.acm.org
JavaScript has become one of the most prevalent programming languages. Unfortunately,
some of the unique properties that contribute to this popularity also make JavaScript …

[HTML][HTML] Ethical hacking for IoT: Security issues, challenges, solutions and recommendations

JPA Yaacoub, HN Noura, O Salman… - Internet of Things and …, 2023 - Elsevier
In recent years, attacks against various Internet-of-Things systems, networks, servers,
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …

Security testing: A survey

M Felderer, M Büchler, M Johns, AD Brucker… - Advances in …, 2016 - Elsevier
Identifying vulnerabilities and ensuring security functionality by security testing is a widely
applied measure to evaluate and improve the security of software. Due to the openness of …

Libd: Scalable and precise third-party library detection in android markets

M Li, W Wang, P Wang, S Wang, D Wu… - 2017 IEEE/ACM 39th …, 2017 - ieeexplore.ieee.org
With the thriving of the mobile app markets, third-party libraries are pervasively integrated in
the Android applications. Third-party libraries provide functionality such as advertisements …

Identity confusion in {WebView-based} mobile app-in-app ecosystems

L Zhang, Z Zhang, A Liu, Y Cao, X Zhang… - 31st USENIX Security …, 2022 - usenix.org
Mobile applications (apps) often delegate their own functions to other parties, which makes
them become a super ecosystem hosting these parties. Therefore, such mobile apps are …

A survey on ethical hacking: issues and challenges

JPA Yaacoub, HN Noura, O Salman… - arXiv preprint arXiv …, 2021 - arxiv.org
Security attacks are growing in an exponential manner and their impact on existing systems
is seriously high and can lead to dangerous consequences. However, in order to reduce the …

A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software

A Sadeghi, H Bagheri, J Garcia… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …

[PDF][PDF] Understanding and automatically preventing injection attacks on Node. js

CA Staicu, M Pradel, B Livshits - Network and Distributed System …, 2018 - software-lab.org
The NODE. JS ecosystem has lead to the creation of many modern applications, such as
server-side web applications and desktop applications. Unlike client-side JavaScript code …

Usable security for QR code

R Focardi, FL Luccio, HAM Wahsheh - Journal of Information Security and …, 2019 - Elsevier
QR codes are widely used in various settings such as consumer advertising, commercial
tracking, ticketing and marketing. People tend to scan QR codes and trust their content, but …

Sok: Lessons learned from android security research for appified software platforms

Y Acar, M Backes, S Bugiel, S Fahl… - … IEEE Symposium on …, 2016 - ieeexplore.ieee.org
Android security and privacy research has boomed in recent years, far outstripping
investigations of other appified platforms. However, despite this attention, research efforts …