A survey on web application penetration testing

EA Altulaihan, A Alismail, M Frikha - Electronics, 2023 - mdpi.com
Websites are becoming increasingly effective communication tools. Nevertheless, web
applications are vulnerable to attack and can give attackers access to sensitive information …

The essence of command injection attacks in web applications

Z Su, G Wassermann - Acm Sigplan Notices, 2006 - dl.acm.org
Web applications typically interact with a back-end database to retrieve persistent data and
then present the data to the user as dynamically generated output, such as HTML web …

An OWASP top ten driven survey on web application protection methods

OB Fredj, O Cheikhrouhou, M Krichen… - Risks and Security of …, 2021 - Springer
Web applications (WAs) are constantly evolving and deployed at broad scale. However, they
are exposed to a variety of attacks. The biggest challenge facing organizations is how to …

SQLProb: a proxy-based architecture towards preventing SQL injection attacks

A Liu, Y Yuan, D Wijesekera, A Stavrou - Proceedings of the 2009 ACM …, 2009 - dl.acm.org
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control
code, used against Database-connected Web applications. To curtail the attackers' ability to …

Communication across domains

S Isaacs, G Moore, D Thorpe… - US Patent 8,185,737, 2012 - Google Patents
2003/0002526 A1 1/2003 Dias et al. 2005/0256924 A1 11/2005 Chory et al. 2003/0014659
A1 1/2003 Zhu 2005/0259655 A1 11/2005 Cuervo et al. 2003/0023445 A1 1/2003 Trifon …

Cyberattacks: Why, what, who, and how

S Liu, B Cheng - IT professional, 2009 - ieeexplore.ieee.org
As computers, information systems, and networking have become increasingly ubiquitous,
cybersecurity has become even more critical for the continuity of basic business operations …

A review on e-commerce-the developing trend

N Faujdar, R Agrawal - AIP Conference Proceedings, 2023 - pubs.aip.org
India is rapidly becoming a growing E-commerce destination. With the quick utilization of the
web, E-commerce has been expanded with the climax. E-commerce deals with the selling …

Neutralizing SQL injection attack using server side code modification in web applications

AK Dalai, SK Jena - Security and Communication Networks, 2017 - Wiley Online Library
Reports on web application security risks show that SQL injection is the top most
vulnerability. The journey of static to dynamic web pages leads to the use of database in …

Running internet applications with low rights

RA Franco, AP Ganjam, JG Bedworth… - US Patent …, 2011 - Google Patents
4,227,253 A 10, 1980 EhrSam et al. 4,984.272 A 1/1991 McIlroy et al. 5,210,874 A 5/1993
Karger 5,339,422 A 8, 1994 Brender et al. 5,377,188 A 12, 1994 Seki 5,428,529 A 6, 1995 …

Tainted flow analysis on e-SSA-form programs

A Rimsa, M d'Amorim, FM Quintão Pereira - … , CC 2011, Held as Part of the …, 2011 - Springer
Tainted flow attacks originate from program inputs maliciously crafted to exploit software
vulnerabilities. These attacks are common in server-side scripting languages, such as PHP …