Results 1 to 10 of about 149,421 (186)

Preventing SQL Injection through Automatic Query Sanitization with ASSIST [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2010
Web applications are becoming an essential part of our everyday lives. Many of our activities are dependent on the functionality and security of these applications. As the scale of these applications grows, injection vulnerabilities such as SQL injection
Raymond Mui, Phyllis Frankl
doaj   +4 more sources

Input Validation Vulnerabilities in Web Applications: Systematic Review, Classification, and Analysis of the Current State-of-the-Art

open access: yesIEEE Access, 2023
In recent years, huge increase in attacks and data breaches is noticed. Most of the attacks are performed and focused on the vulnerabilities related to web applications. Hence, nowadays the mitigation of application vulnerabilities is an ignited research
Faris Faisal Fadlalla   +1 more
doaj   +3 more sources

A Web Second-Order Vulnerabilities Detection Method

open access: yesIEEE Access, 2018
Second-order vulnerabilities are more subtle and more destructive than the first-order vulnerabilities. After researching and analyzing the principles of web penetration testing and second-order attack principles, this paper proposes a method to detect ...
Miao Liu, Bin Wang
doaj   +3 more sources

Web Vulnerability Study of Online Pharmacy Sites [PDF]

open access: yesInformatics for Health and Social Care, 2011
Consumers are increasingly using online pharmacies, but these sites may not provide an adequate level of security with the consumers’ personal data. There is a gap in this research addressing the problems of security vulnerabilities in this industry. The
Kuzma, Joanne
core   +5 more sources

Detection of the Security Vulnerabilities in Web Applications [PDF]

open access: yesInformatică economică, 2009
The contemporary organizations develop business processes in a very complex environment. The IT&C technologies are used by organizations to improve their competitive advantages. But, the IT&C technologies are not perfect. They are developed in an
Marius POPA
doaj   +2 more sources

Large Language Model-Powered Protected Interface Evasion: Automated Discovery of Broken Access Control Vulnerabilities in Internet of Things Devices [PDF]

open access: yesSensors
Broken access control vulnerabilities pose significant security risks to the protected web interfaces of IoT devices, enabling adversaries to gain unauthorized access to sensitive configurations and even use them as stepping stones for attacking the ...
Enze Wang   +8 more
doaj   +2 more sources

Comparative evaluation of approaches & tools for effective security testing of Web applications [PDF]

open access: yesPeerJ Computer Science
It is generally accepted that adopting both static application security testing (SAST) and dynamic application security testing (DAST) approaches is vital for thorough and effective security testing.
Sana Qadir   +3 more
doaj   +3 more sources

Approach of Web Application Access Control Vulnerability Detection Based on State Deviation Analysis [PDF]

open access: yesJisuanji kexue, 2023
Attackers can exploit vulnerabilities in Web applications to implement malicious behaviors such as disrupting application functionality and Trojan implantation.For the detection of access control vulnerabilities in Web applications,existing me-thods have
MA Qican, WU Zehui, WANG Yunchao, WANG Xinlei
doaj   +1 more source

Remote Penetration Testing with Telegram Bot

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2023
The widespread of websites and web applications makes them the main target of cyber attacks. One way to increase security is to perform a penetration test.
Naufal Hafiz   +4 more
doaj   +1 more source

Deep Learning for Vulnerability and Attack Detection on Web Applications: A Systematic Literature Review

open access: yesFuture Internet, 2022
Web applications are the best Internet-based solution to provide online web services, but they also bring serious security challenges. Thus, enhancing web applications security against hacking attempts is of paramount importance.
Rokia Lamrani Alaoui, El Habib Nfaoui
doaj   +1 more source

Home - About - Disclaimer - Privacy