Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMay 2024
A systematic literature review on software security testing using metaheuristics
Automated Software Engineering (KLU-AUSE), Volume 31, Issue 2https://doi.org/10.1007/s10515-024-00433-0AbstractThe security of an application is critical for its success, as breaches cause loss for organizations and individuals. Search-based software security testing (SBSST) is the field that utilizes metaheuristics to generate test cases for the software ...
- research-articleNovember 2023
ZTWeb: Cross site scripting detection based on zero trust
AbstractPolicy defense technology is the mainstream XSS defense technology. However, defense mechanisms with fixed policies may hardly cover the attack surface persistently in dynamic environments. Moreover, the undifferentiated policy makes the ...
- ArticleNovember 2023
XSS Attack Detection by Attention Mechanism Based on Script Tags in URLs
Information Security Practice and ExperiencePages 562–578https://doi.org/10.1007/978-981-99-7032-2_33AbstractXSS (Cross-Site Scripting) attacks exploit vulnerabilities in web applications, and many victims have been reported. As a countermeasure for this, existing studies propose methods to detect XSS attacks by combining natural language processing ...
- research-articleMay 2023
Insecurity Refactoring: Automated Injection of Vulnerabilities in Source Code
AbstractInsecurity Refactoring is a change to the internal structure of software to inject a vulnerability without changing the observable behavior in a normal use case scenario. An implementation of Insecurity Refactoring is formally explained to inject ...
-
- research-articleApril 2023
Rise of the Metaverse’s Immersive Virtual Reality Malware and the Man-in-the-Room Attack & Defenses
AbstractThe allure of the metaverse along with Virtual Reality (VR) technologies and speed at which they are deployed may shift focus away from security and privacy fundamentals. In this work we employ classic exploitation techniques against cutting edge ...
- research-articleFebruary 2023
An Enhanced Static Taint Analysis Approach to Detect Input Validation Vulnerability
Journal of King Saud University - Computer and Information Sciences (JKSUCIS), Volume 35, Issue 2Pages 682–701https://doi.org/10.1016/j.jksuci.2023.01.009AbstractThe detection of feasible paths helps to minimize the false positive rate. However, the previous works did not consider the feasibility of the program paths during the analysis detection of input validation vulnerabilities, which led ...
- ArticleNovember 2022
An Ensemble Based Deep Learning Framework to Detect and Deceive XSS and SQL Injection Attacks
Intelligent Information and Database SystemsPages 183–195https://doi.org/10.1007/978-3-031-21743-2_15AbstractSafeguarding websites is of utmost importance nowadays because of a wide variety of attacks being launched against them. Moreover, lack of security awareness and widespread use of traditional security solutions like simple Web Application ...
- ArticleOctober 2022
Explaining Unexpected Answers of SPARQL Queries
Web Information Systems Engineering – WISE 2022Pages 136–151https://doi.org/10.1007/978-3-031-20891-1_11Abstract“Why am I not getting the right answer?" is a question many Knowledge Base users may ask themselves. In particular, novice users can easily make mistakes and find differences between the answer they expected and the answer they got. This problem ...
- research-articleSeptember 2022
- research-articleJune 2021
Careful Who You Trust: Studying the Pitfalls of Cross-Origin Communication
ASIA CCS '21: Proceedings of the 2021 ACM Asia Conference on Computer and Communications SecurityPages 110–122https://doi.org/10.1145/3433210.3437510In the past, Web applications were mostly static and most of the content was provided by the site itself. Nowadays, they have turned into rich client-side experiences customized for the user where third parties supply a considerable amount of content, ...
- research-articleApril 2021
Development of web browser prototype with embedded classification capability for mitigating Cross-Site Scripting attacks
AbstractMitigation of Cross-Site Scripting (XSS) with machine learning techniques is the recent interest of researchers. A large amount of research work is reported in this domain. A lack of real-time tools working on the basis of these ...
Highlights- Identification of web page features which can indicate maliciousness.
- ...
- research-articleMarch 2020
Hybrid taint analysis for Java EE
SAC '20: Proceedings of the 35th Annual ACM Symposium on Applied ComputingPages 1716–1725https://doi.org/10.1145/3341105.3373887We present a new approach to protect Java EE web applications against injection attacks, which can handle large commercial systems. We first describe a novel approach to taint analysis for Java EE, which can be characterized by "strings only", "taint ...
- research-articleMay 2020
A Survey on XSS Attack Detection and Prevention in Web Applications
ICMLC '20: Proceedings of the 2020 12th International Conference on Machine Learning and ComputingPages 443–449https://doi.org/10.1145/3383972.3384027With the popularity of web technology, web applications become more increasingly vulnerable and are exposed to malicious attacks. Cross Site Scripting(XSS) is a typical attack in web applications. When a vulnerability is exploited, an attacker may ...
- research-articleJanuary 2020
Cross-site scripting (XSS) attacks and mitigation: A survey
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 166, Issue Chttps://doi.org/10.1016/j.comnet.2019.106960AbstractThe results of the Cisco 2018 Annual Security Report show that all analyzed web applications have at least one vulnerability. It also shows that web attacks are becoming more frequent, specific and sophisticated. According to this ...
- ArticleSeptember 2019
Exact and Approximate Rule Extraction from Neural Networks with Boolean Features
IJCCI 2019: Proceedings of the 11th International Joint Conference on Computational IntelligencePages 424–433https://doi.org/10.5220/0008362904240433Rule extraction from classifiers treated as black boxes is an important topic in explainable artificial intelligence (XAI). It is concerned with finding rules that describe classifiers and that are understandable to humans, having the form of (I ...
- research-articleJuly 2019
Static Identification of Injection Attacks in Java
- Fausto Spoto,
- Elisa Burato,
- Michael D. Ernst,
- Pietro Ferrara,
- Alberto Lovato,
- Damiano Macedonio,
- Ciprian Spiridon
ACM Transactions on Programming Languages and Systems (TOPLAS), Volume 41, Issue 3Article No.: 18, Pages 1–58https://doi.org/10.1145/3332371The most dangerous security-related software errors, according to the OWASP Top Ten 2017 list, affect web applications. They are potential injection attacks that exploit user-provided data to execute undesired operations: database access and updates (SQL ...
- research-articleFebruary 2019
CookieArmor: Safeguarding against cross‐site request forgery and session hijacking
Internet browsers use cookies and session‐IDs for maintaining HTTP state information which has led to several security vulnerabilities such as cross‐site request forgery (CSRF) and session hijacking. Several works have been carried out in the past to ...
- articleFebruary 2019
An empirical study on combining diverse static analysis tools for web security vulnerabilities based on development scenarios
Automated Static Analysis Tool (ASATs) are one of the best ways to search for vulnerabilities in applications, so they are a resource widely used by developers to improve their applications. However, it is well-known that the performance of such tools ...
- review-articleSeptember 2018
A survey of detection methods for XSS attacks
Journal of Network and Computer Applications (JNCA), Volume 118, Issue CPages 113–143https://doi.org/10.1016/j.jnca.2018.06.004AbstractCross-site scripting attack (abbreviated as XSS) is an unremitting problem for the Web applications since the early 2000s. It is a code injection attack on the client-side where an attacker injects malicious payload into a vulnerable ...