DetLogic: A black-box approach for detecting logic vulnerabilities in web applications
Web applications are subject to attacks by malicious users owing to the fact that the
applications are implemented by software developers with insufficient knowledge about …
applications are implemented by software developers with insufficient knowledge about …
[PDF][PDF] Business-Layer Session Puzzling Racer: Dynamic Security Testing Against Session Puzzling Race Conditions in Business Layer.
Parallel execution of multiple threads of a web application will result in server-side races if
the web application is not synchronized correctly. Server-side race is susceptible to flaws in …
the web application is not synchronized correctly. Server-side race is susceptible to flaws in …
Detecting application logic vulnerabilities via finding incompatibility between application design and implementation
M Ghorbanzadeh, HR Shahriari - IET Software, 2020 - Wiley Online Library
Logic vulnerabilities are due to defects in the application logic implementation such that the
application logic is not the logic that was expected. Indeed, such vulnerabilities pattern …
application logic is not the logic that was expected. Indeed, such vulnerabilities pattern …
[PDF][PDF] A Literature Review and Practitioner Sur-vey on Using Vulnerability Detection Tools to Defend Against Access Control Vulnera-bilities
EB Sørensen - 2019 - researchgate.net
Methods: Research articles relevant to the literature study were obtained through
snowballing and keyword searches in digital libraries. The survey was formed as a digital …
snowballing and keyword searches in digital libraries. The survey was formed as a digital …
Behavior-Based Attack Generation for Detecting Web Application Vulnerabilities
G Deepa - 2018 - 210.212.194.26
Web applications provide a convenient platform to support a wide range of day-today
activities such as bill payments, online shopping, banking, and social networking. However …
activities such as bill payments, online shopping, banking, and social networking. However …
Inferring Specifications for Web Application Security
M Monshizadeh - 2017 - indigo.uic.edu
Over the past two decades, we have been witnessing the evolution of the web applications
from simple static pages into complex, interactive platforms. With increasing demand to have …
from simple static pages into complex, interactive platforms. With increasing demand to have …