Results 241 to 250 of about 149,520 (284)
Some of the next articles are maybe not open access.

Evaluation of web vulnerability scanners

2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2015
In recent yeas a lot of web applications have been released in the world. At the same time, cyber attacks against web application vulnerabilities have also increased. In such a situation, it is necessary to make web applications more secure. However checking all web vulnerabilities by hand is very difficult and time-consuming.
Yuma Makino, Vitaly Klyuev
openaire   +1 more source

Multi-Language Web Vulnerability Detection

2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2020
Most web applications are compromised due to vulnerable source code [1]. Static code analysis tools that are often used to find security vulnerabilities in code have two main problems: they are language-specific, and they have to be programmed, or at least configured manually, to deal with new types of vulnerabilities.
Alexandra Figueiredo   +2 more
openaire   +1 more source

An Automatic Vulnerability Scanner for Web Applications

2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2020
With the progressive development of web applications and the urgent requirement of web security, vulnerability scanner has been particularly emphasized, which is regarded as a fundamental component for web security assurance. Various scanners are developed with the intention of that discovering the possible vulnerabilities in advance to avoid malicious
Haibo Chen 0005   +5 more
openaire   +1 more source

Enlargement of vulnerable web applications for testing

The Journal of Supercomputing, 2017
There are two main kinds of vulnerable web applications, usual applications developed with a specific aim and applications which are vulnerable by design. On one hand, the usual applications are those that are used everywhere and on a daily basis, and where vulnerabilities are detected, and often mended, such as online banking systems, newspaper sites,
Fernando Román Muñoz   +2 more
openaire   +1 more source

Evaluation of Web Application Vulnerability Scanner for Modern Web Application

2021 International Conference on Artificial Intelligence and Computer Science Technology (ICAICST), 2021
Current needs and developments encourage the increasing use of digital-based applications. One of them is a web-based application that is easy to access and used by today’s society. Along with these developments, it is common for vulnerabilities to exist in web applications that the owners are unaware of.
Azwar Al Anhar, Yohan Suryanto
openaire   +1 more source

LDAP Vulnerability Detection in Web Applications

International Journal of Secure Software Engineering, 2017
Lightweight Directory Access Protocol (LDAP) is commonly used in web applications to provide lookup information and enforcing authentication. Web applications may suffer from LDAP injection vulnerabilities that can lead to security breaches such as login bypass and privilege escalation.
Hossain Shahriar   +2 more
openaire   +1 more source

On the Challenges of Automated Testing of Web Vulnerabilities

2020 IEEE 29th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), 2020
Pentesting is an important process to reduce the risks associated with attacks in Web applications. However, testers may find some difficulties while conducting this process. This paper aims to discuss the main challenges founded while performing pentesting.
Luis F. de Lima   +5 more
openaire   +1 more source

Session management vulnerabilities in today's web

IEEE Security & Privacy Magazine, 2010
Many cyberattacks exploit session management vulnerabilities that allow attackers to be recognized as valid website users. This article describes Web application design flaws that could be exploited for session management attacks and discusses these flaws' current prevalence.
Corrado Aaron Vlsaggio   +1 more
openaire   +1 more source

Web Login Vulnerability Analysis and Countermeasures

2014 International Conference on IT Convergence and Security (ICITCS), 2014
Recently cyber hacking incidents and accidents increase significantly so that the damage has spread to businesses, society and national level. It increases the external and internal threats significantly to resources on the corporate network by the malicious software diffusing through the internet.
Seung-Jae Yoo, Jeong-Mo Yang
openaire   +1 more source

Defending against Web Application Vulnerabilities

Computer, 2012
Although no single tool or technique can guard against the host of possible attacks, a defense-in-depth approach, with overlapping protections, can help secure Web applications.
Nuno Antunes, Marco Vieira
openaire   +1 more source

Home - About - Disclaimer - Privacy