Toss a fault to your witcher: Applying grey-box coverage-guided mutational fuzzing to detect sql and command injection vulnerabilities
Black-box web application vulnerability scanners attempt to automatically identify
vulnerabilities in web applications without access to the source code. However, they do so …
vulnerabilities in web applications without access to the source code. However, they do so …
The Great Request Robbery: An Empirical Study of Client-side Request Hijacking Vulnerabilities on the Web
S Khodayari, T Barber… - Proceedings of 45th …, 2024 - publications.cispa.saarland
Request forgery attacks are among the oldest threats to Web applications, traditionally
caused by server-side confused deputy vulnerabilities. However, recent advancements in …
caused by server-side confused deputy vulnerabilities. However, recent advancements in …
Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation
FT Chimuco, JBF Sequeiros, CG Lopes… - International Journal of …, 2023 - Springer
The adoption and popularization of mobile devices, such as smartphones and tablets,
accentuated after the second decade of this century, has been motivated by the growing …
accentuated after the second decade of this century, has been motivated by the growing …
Protecting intellectual property with reliable availability of learning models in ai-based cybersecurity services
Artificial intelligence (AI)-based cybersecurity services offer significant promise in many
scenarios, including malware detection, content supervision, and so on. Meanwhile, many …
scenarios, including malware detection, content supervision, and so on. Meanwhile, many …
CORAL: Container Online Risk Assessment with Logical attack graphs
Container-based architectures, with their highly volatile runtime configurations, rapid code
changes, and dependence on third-party code, have raised security concerns. The first step …
changes, and dependence on third-party code, have raised security concerns. The first step …
Measuring developers' web security awareness from attack and defense perspectives
Web applications are the public-facing components of information systems, which makes
them an easy entry point for various types of attacks. While it is often the responsibility of …
them an easy entry point for various types of attacks. While it is often the responsibility of …
Preventive measures for digital learning spaces' security issues
The COVID-19 pandemic affected humanity and changed impacted people's habits
worldwide. The necessity for social distancing has led to increasing remote working and …
worldwide. The necessity for social distancing has led to increasing remote working and …
{SSRF} vs. Developers: A Study of {SSRF-Defenses} in {PHP} Applications
Server-side requests (SSR) are a potent and important tool for modern web applications, as
they enable features such as link preview and web hooks. Unfortunately, naive usage of …
they enable features such as link preview and web hooks. Unfortunately, naive usage of …
[PDF][PDF] Detecting server-side request forgery (SSRF) attack by using deep learning techniques
K Al-talak, O Abbass - … Journal of Advanced Computer Science and …, 2021 - academia.edu
Server-side request forgery (SSRF) is a security vulnerability that arises from a vulnerability
in web applications. For example, when the services are accessed via URL the attacker …
in web applications. For example, when the services are accessed via URL the attacker …
Sidecar-based Path-aware Security for Microservices
C Meadows, S Hounsinou, T Wood… - Proceedings of the 28th …, 2023 - dl.acm.org
Microservice architectures decompose web applications into loosely-coupled, distributed
components that interact with each other to provide an overall service. While this popular …
components that interact with each other to provide an overall service. While this popular …