Automatic generation of tests to exploit XML injection vulnerabilities in web applications
Modern enterprise systems can be composed of many web services (eg, SOAP and
RESTful). Users of such systems might not have direct access to those services, and rather …
RESTful). Users of such systems might not have direct access to those services, and rather …
Fault analysis of service‐oriented systems: a systematic literature review
GP Bhandari, R Gupta - IET Software, 2018 - Wiley Online Library
Due to the increasing scale and complexity of service‐oriented systems (SOSs)
understanding fault and its recovery mechanism is a tedious task so there is a strong …
understanding fault and its recovery mechanism is a tedious task so there is a strong …
A study of the causal relationship between IT governance inhibitors and its success in Korea enterprises
CH Lee, JH Lee, JS Park… - Proceedings of the 41st …, 2008 - ieeexplore.ieee.org
In recent years, the emergence of the term IT Governance (ITG) has pointed to the
increasing importance for business of effecting an alignment between its strategic direction …
increasing importance for business of effecting an alignment between its strategic direction …
Hydra: Feedback-driven black-box exploitation of injection vulnerabilities
Context: Injection vulnerabilities remain an omnipresent threat to web application security.
These issues arise when user-supplied input is included in commands constructed by the …
These issues arise when user-supplied input is included in commands constructed by the …
Combinatorial methods for dynamic gray‐box SQL injection testing
This work presents an extended and enhanced gray‐box combinatorial security testing
methodology for SQL injection vulnerabilities in web applications. We propose multiple new …
methodology for SQL injection vulnerabilities in web applications. We propose multiple new …
Known xml vulnerabilities are still a threat to popular parsers and open source systems
The Extensible Markup Language (XML) is extensively used in software systems and
services. Various XML-based attacks, which may result in sensitive information leakage or …
services. Various XML-based attacks, which may result in sensitive information leakage or …
Automated and effective testing of web services for XML injection attacks
XML is extensively used in web services for integration and data exchange. Its popularity
and wide adoption make it an attractive target for attackers and a number of XML-based …
and wide adoption make it an attractive target for attackers and a number of XML-based …
Search-based multi-vulnerability testing of XML injections in web applications
Modern web applications often interact with internal web services, which are not directly
accessible to users. However, malicious user inputs can be used to exploit security …
accessible to users. However, malicious user inputs can be used to exploit security …
Identification of Risk Factors Using ANFIS-Based Security Risk Assessment Model for SDLC Phases
In the field of software development, the efficient prioritizing of software risks was essential
and play significant roles. However, finding a viable solution to this issue is a difficult …
and play significant roles. However, finding a viable solution to this issue is a difficult …
Fault prediction in SOA-based systems using deep learning techniques
GP Bhandari, R Gupta - … Journal of Web Services Research (IJWSR), 2020 - igi-global.com
Abstract Fault prediction in Service Oriented Architecture (SOA) based systems is one of the
important tasks to minimize the computation cost and time of the software system …
important tasks to minimize the computation cost and time of the software system …