Efficiency and effectiveness of web application vulnerability detection approaches: A review

B Zhang, J Li, J Ren, G Huang - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Most existing surveys and reviews on web application vulnerability detection (WAVD)
approaches focus on comparing and summarizing the approaches' technical details …

A survey on string constraint solving

R Amadini - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
String constraint solving refers to solving combinatorial problems involving constraints over
string variables. String solving approaches have become popular over the past few years …

Z3-str: A z3-based string solver for web application analysis

Y Zheng, X Zhang, V Ganesh - Proceedings of the 2013 9th Joint …, 2013 - dl.acm.org
Analyzing web applications requires reasoning about strings and non-strings cohesively.
Existing string solvers either ignore non-string program behavior or support limited set of …

S3: A symbolic string solver for vulnerability detection in web applications

MT Trinh, DH Chu, J Jaffar - Proceedings of the 2014 ACM SIGSAC …, 2014 - dl.acm.org
Motivated by the vulnerability analysis of web programs which work on string inputs, we
present S3, a new symbolic string solver. Our solver employs a new algorithm for a …

Andromeda: Accurate and Scalable Security Analysis of Web Applications

O Tripp, M Pistoia, P Cousot, R Cousot… - … 2013, Held as Part of the …, 2013 - Springer
Security auditing of industry-scale software systems mandates automation. Static taint
analysis enables deep and exhaustive tracking of suspicious data flows for detection of …

Automata-based model counting for string constraints

A Aydin, L Bang, T Bultan - International Conference on Computer Aided …, 2015 - Springer
Most common vulnerabilities in Web applications are due to string manipulation errors in
input validation and sanitization code. String constraint solvers are essential components of …

F4F: taint analysis of framework-based web applications

M Sridharan, S Artzi, M Pistoia, S Guarnieri… - Proceedings of the …, 2011 - dl.acm.org
This paper presents F4F (Framework For Frameworks), a system for effective taint analysis
of framework-based web applications. Most modern web applications utilize one or more …

Path sensitive static analysis of web applications for remote code execution vulnerability detection

Y Zheng, X Zhang - 2013 35th International Conference on …, 2013 - ieeexplore.ieee.org
Remote code execution (RCE) attacks are one of the most prominent security threats for web
applications. It is a special kind of cross-site-scripting (XSS) attack that allows client inputs to …

Aletheia: Improving the usability of static security analysis

O Tripp, S Guarnieri, M Pistoia, A Aravkin - Proceedings of the 2014 …, 2014 - dl.acm.org
The scale and complexity of modern software systems complicate manual security auditing.
Automated analysis tools are gradually becoming a necessity. Specifically, static security …

Z3str3: A string solver with theory-aware heuristics

M Berzish, V Ganesh, Y Zheng - 2017 Formal Methods in …, 2017 - ieeexplore.ieee.org
We present a new string SMT solver, Z3str3, that is faster than its competitors Z3str2, Norn,
CVC4, S3, and S3P over a majority of three industrial-strength benchmarks, namely, Kaluza …