Toss a fault to your witcher: Applying grey-box coverage-guided mutational fuzzing to detect sql and command injection vulnerabilities

E Trickel, F Pagani, C Zhu, L Dresel… - … IEEE symposium on …, 2023 - ieeexplore.ieee.org
Black-box web application vulnerability scanners attempt to automatically identify
vulnerabilities in web applications without access to the source code. However, they do so …

The Great Request Robbery: An Empirical Study of Client-side Request Hijacking Vulnerabilities on the Web

S Khodayari, T Barber… - Proceedings of 45th …, 2024 - publications.cispa.saarland
Request forgery attacks are among the oldest threats to Web applications, traditionally
caused by server-side confused deputy vulnerabilities. However, recent advancements in …

Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation

FT Chimuco, JBF Sequeiros, CG Lopes… - International Journal of …, 2023 - Springer
The adoption and popularization of mobile devices, such as smartphones and tablets,
accentuated after the second decade of this century, has been motivated by the growing …

Protecting intellectual property with reliable availability of learning models in ai-based cybersecurity services

G Ren, J Wu, G Li, S Li… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Artificial intelligence (AI)-based cybersecurity services offer significant promise in many
scenarios, including malware detection, content supervision, and so on. Meanwhile, many …

CORAL: Container Online Risk Assessment with Logical attack graphs

D Tayouri, OS Cohen, I Maimon, D Mimran, Y Elovici… - Computers & …, 2024 - Elsevier
Container-based architectures, with their highly volatile runtime configurations, rapid code
changes, and dependence on third-party code, have raised security concerns. The first step …

Measuring developers' web security awareness from attack and defense perspectives

M Sahin, T Ünlü, C Hebert, LA Shepherd… - 2022 IEEE Security …, 2022 - ieeexplore.ieee.org
Web applications are the public-facing components of information systems, which makes
them an easy entry point for various types of attacks. While it is often the responsibility of …

Preventive measures for digital learning spaces' security issues

E Djeki, J Degila, C Bondiombouy… - 2022 IEEE Technology …, 2022 - ieeexplore.ieee.org
The COVID-19 pandemic affected humanity and changed impacted people's habits
worldwide. The necessity for social distancing has led to increasing remote working and …

{SSRF} vs. Developers: A Study of {SSRF-Defenses} in {PHP} Applications

M Wessels, S Koch, G Pellegrino, M Johns - 33rd USENIX Security …, 2024 - usenix.org
Server-side requests (SSR) are a potent and important tool for modern web applications, as
they enable features such as link preview and web hooks. Unfortunately, naive usage of …

[PDF][PDF] Detecting server-side request forgery (SSRF) attack by using deep learning techniques

K Al-talak, O Abbass - … Journal of Advanced Computer Science and …, 2021 - academia.edu
Server-side request forgery (SSRF) is a security vulnerability that arises from a vulnerability
in web applications. For example, when the services are accessed via URL the attacker …

Sidecar-based Path-aware Security for Microservices

C Meadows, S Hounsinou, T Wood… - Proceedings of the 28th …, 2023 - dl.acm.org
Microservice architectures decompose web applications into loosely-coupled, distributed
components that interact with each other to provide an overall service. While this popular …