[HTML][HTML] Research communities in cyber security vulnerability assessments: A comprehensive literature review

F Heiding, S Katsikeas, R Lagerström - Computer Science Review, 2023 - Elsevier
Ethical hacking and vulnerability assessments are gaining rapid momentum as academic
fields of study. Still, it is sometimes unclear what research areas are included in the …

Analysis of web security using open web application security project 10

MA Helmiawan, E Firmansyah, I Fadil… - … on Cyber and IT …, 2020 - ieeexplore.ieee.org
Open Web Application Security Project 10 is a web application security testing framework
method that focuses on web application security to find weaknesses in a website. The Open …

Finding bugs in cryptographic hash function implementations

N Mouha, MS Raunak, DR Kuhn… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Cryptographic hash functions are security-critical algorithms with many practical
applications, notably in digital signatures. Developing an approach to test them can be …

Advances in combinatorial testing

R Tzoref-Brill - Advances in Computers, 2019 - Elsevier
Since their introduction into software testing in the mid-1980s, combinatorial methods for test
design gathered popularity as a testing best practice and as a prominent software testing …

Locating hardware trojans using combinatorial testing for cryptographic circuits

L Kampel, P Kitsos, DE Simos - IEEE Access, 2022 - ieeexplore.ieee.org
This paper presents a novel method for locating combinational hardware Trojans (HT)
based on fault location approaches used in combinatorial testing. This method relies …

Automated combinatorial testing for detecting SQL vulnerabilities in web applications

DE Simos, J Zivanovic… - 2019 IEEE/ACM 14th …, 2019 - ieeexplore.ieee.org
In this paper, we present a combinatorial testing methodology for testing web applications in
regards to SQL injection vulnerabilities. We describe three attack grammars that were …

Hydra: Feedback-driven black-box exploitation of injection vulnerabilities

M Leithner, B Garn, DE Simos - Information and Software Technology, 2021 - Elsevier
Context: Injection vulnerabilities remain an omnipresent threat to web application security.
These issues arise when user-supplied input is included in commands constructed by the …

Effective covering array generation using an improved particle swarm optimization

Z Li, Y Chen, Y Song, K Lu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In the test case generation process of combinatorial testing, particle swarm optimization
(PSO) is widely concerned for its simple implementation and fast convergence rate; …

Combinatorial methods for dynamic gray‐box SQL injection testing

B Garn, J Zivanovic, M Leithner… - … Testing, Verification and …, 2022 - Wiley Online Library
This work presents an extended and enhanced gray‐box combinatorial security testing
methodology for SQL injection vulnerabilities in web applications. We propose multiple new …

Application of deep learning models to generate rich, dynamic and production-like test data

C Tan, R Behjati, E Arisholm - Empirical Software Engineering, 2025 - Springer
Traditionally, software development teams in many industries have used copies of
production databases or their masked, anonymized, or obfuscated versions for testing …