DetLogic: A black-box approach for detecting logic vulnerabilities in web applications

G Deepa, PS Thilagam, A Praseed, AR Pais - Journal of Network and …, 2018 - Elsevier
Web applications are subject to attacks by malicious users owing to the fact that the
applications are implemented by software developers with insufficient knowledge about …

[PDF][PDF] Business-Layer Session Puzzling Racer: Dynamic Security Testing Against Session Puzzling Race Conditions in Business Layer.

M Alidoosti, A Nowroozi, A Nickabadi - ISeCure, 2022 - sid.ir
Parallel execution of multiple threads of a web application will result in server-side races if
the web application is not synchronized correctly. Server-side race is susceptible to flaws in …

Detecting application logic vulnerabilities via finding incompatibility between application design and implementation

M Ghorbanzadeh, HR Shahriari - IET Software, 2020 - Wiley Online Library
Logic vulnerabilities are due to defects in the application logic implementation such that the
application logic is not the logic that was expected. Indeed, such vulnerabilities pattern …

[PDF][PDF] A Literature Review and Practitioner Sur-vey on Using Vulnerability Detection Tools to Defend Against Access Control Vulnera-bilities

EB Sørensen - 2019 - researchgate.net
Methods: Research articles relevant to the literature study were obtained through
snowballing and keyword searches in digital libraries. The survey was formed as a digital …

Behavior-Based Attack Generation for Detecting Web Application Vulnerabilities

G Deepa - 2018 - 210.212.194.26
Web applications provide a convenient platform to support a wide range of day-today
activities such as bill payments, online shopping, banking, and social networking. However …

Inferring Specifications for Web Application Security

M Monshizadeh - 2017 - indigo.uic.edu
Over the past two decades, we have been witnessing the evolution of the web applications
from simple static pages into complex, interactive platforms. With increasing demand to have …