Efficiency and effectiveness of web application vulnerability detection approaches: A review
Most existing surveys and reviews on web application vulnerability detection (WAVD)
approaches focus on comparing and summarizing the approaches' technical details …
approaches focus on comparing and summarizing the approaches' technical details …
A survey on string constraint solving
R Amadini - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
String constraint solving refers to solving combinatorial problems involving constraints over
string variables. String solving approaches have become popular over the past few years …
string variables. String solving approaches have become popular over the past few years …
Z3-str: A z3-based string solver for web application analysis
Analyzing web applications requires reasoning about strings and non-strings cohesively.
Existing string solvers either ignore non-string program behavior or support limited set of …
Existing string solvers either ignore non-string program behavior or support limited set of …
S3: A symbolic string solver for vulnerability detection in web applications
Motivated by the vulnerability analysis of web programs which work on string inputs, we
present S3, a new symbolic string solver. Our solver employs a new algorithm for a …
present S3, a new symbolic string solver. Our solver employs a new algorithm for a …
Andromeda: Accurate and Scalable Security Analysis of Web Applications
Security auditing of industry-scale software systems mandates automation. Static taint
analysis enables deep and exhaustive tracking of suspicious data flows for detection of …
analysis enables deep and exhaustive tracking of suspicious data flows for detection of …
Automata-based model counting for string constraints
Most common vulnerabilities in Web applications are due to string manipulation errors in
input validation and sanitization code. String constraint solvers are essential components of …
input validation and sanitization code. String constraint solvers are essential components of …
F4F: taint analysis of framework-based web applications
This paper presents F4F (Framework For Frameworks), a system for effective taint analysis
of framework-based web applications. Most modern web applications utilize one or more …
of framework-based web applications. Most modern web applications utilize one or more …
Path sensitive static analysis of web applications for remote code execution vulnerability detection
Y Zheng, X Zhang - 2013 35th International Conference on …, 2013 - ieeexplore.ieee.org
Remote code execution (RCE) attacks are one of the most prominent security threats for web
applications. It is a special kind of cross-site-scripting (XSS) attack that allows client inputs to …
applications. It is a special kind of cross-site-scripting (XSS) attack that allows client inputs to …
Aletheia: Improving the usability of static security analysis
The scale and complexity of modern software systems complicate manual security auditing.
Automated analysis tools are gradually becoming a necessity. Specifically, static security …
Automated analysis tools are gradually becoming a necessity. Specifically, static security …
Z3str3: A string solver with theory-aware heuristics
We present a new string SMT solver, Z3str3, that is faster than its competitors Z3str2, Norn,
CVC4, S3, and S3P over a majority of three industrial-strength benchmarks, namely, Kaluza …
CVC4, S3, and S3P over a majority of three industrial-strength benchmarks, namely, Kaluza …