Web Application Vulnerabilities Detection Techniques Survey

被引:0
|
作者
Khochare, Nilesh [1 ]
Chalurkar, Satish [1 ]
Meshram, B. B. [1 ]
机构
[1] VJTI, Comp Dept, Mumbai, Maharashtra, India
关键词
Software assurance; software security; software security assurance tool; web application; vulnerability;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There are many commercial software security assurance tools that claim to detect and prevent vulnerabilities in application software. However, a closer look at the tools often leaves one wondering which tools find what vulnerabilities. This paper identifies taxonomy of software security assurance tools and defines one type of tool: web application scanner, i.e., an automated program that examines web applications for security vulnerabilities. We describe the types of functions that are generally found in a web application scanner and how to test it.
引用
收藏
页码:71 / 75
页数:5
相关论文
共 50 条
  • [41] A Survey on Web User Personalization Techniques
    Dhanalakshmi, D.
    Lakshmi, J. Komala
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, : 992 - 996
  • [42] Static detection of logic vulnerabilities in Java']Java web applications
    Fang, Zhejun
    Zhang, Yuqing
    Kong, Ying
    Liu, Qixu
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (03) : 519 - 531
  • [43] Static Detection of Second-Order Vulnerabilities in Web Applications
    Dahse, Johannes
    Holz, Thorsten
    [J]. PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, 2014, : 989 - 1003
  • [44] Automated detection of parameter tampering opportunities and vulnerabilities in web applications
    Bisht, Prithvi
    Hinrichs, Timothy
    Skrupsky, Nazari
    Venkatakrishnan, V.
    [J]. JOURNAL OF COMPUTER SECURITY, 2014, 22 (03) : 415 - 465
  • [45] Survey on Web Application Vulnerability
    Patni, Shradha S.
    Vaidya, Madhav V.
    [J]. HELIX, 2019, 9 (03): : 4941 - 4946
  • [46] Web phishing detection techniques: a survey on the state-of-the-art, taxonomy and future directions
    Vijayalakshmi, M.
    Mercy Shalinie, S.
    Yang, Ming Hour
    Meenakshi, U. Raja
    [J]. IET NETWORKS, 2020, 9 (05) : 235 - 246
  • [47] A survey on smart contract vulnerabilities: Data sources, detection and repair
    Chu, Hanting
    Zhang, Pengcheng
    Dong, Hai
    Xiao, Yan
    Ji, Shunhui
    Li, Wenrui
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2023, 159
  • [48] A survey of static code analysis methods for security vulnerabilities detection
    Kulenovic, Melina
    Donko, Dzenana
    [J]. 2014 37TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2014, : 1381 - 1386
  • [49] Software Vulnerabilities' Detection by Analysing Application Execution Traces
    Koala, Gouayon
    Bassole, Didier
    Tiendrebeogo, Telesphore
    Sie, Oumarou
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (06) : 1288 - 1294
  • [50] Survey of intrusion detection techniques
    Lunt, Teresa F.
    [J]. Computers and Security, 1993, 12 (04): : 405 - 418