Refine your search
Collections
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Admodisastro, Novia
- Removing Cross-Site Scripting Vulnerabilities from Web Applications using the OWASP ESAPI Security Guidelines
Abstract Views :119 |
PDF Views:0
Authors
Affiliations
1 Department of Software Engineering and Information System, Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Serdang - 43400 UPM, Selangor, MY
1 Department of Software Engineering and Information System, Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Serdang - 43400 UPM, Selangor, MY
Source
Indian Journal of Science and Technology, Vol 8, No 30 (2015), Pagination:Abstract
Software security vulnerabilities are present in many web applications and have led to many successful attacks on a daily basis. These attacks, including cross-site scripting, have caused damages for both web site owners and users. Cross-site scripting vulnerabilities are easy to exploit but difficult to eliminate. Most solutions provided only focus on preventing attacks or detecting the vulnerabilities. Very few research works have addressed eliminating these vulnerabilities from the web applications source codes. In this paper, we propose an approach to remove cross-site scripting vulnerabilities from the source code before an application is deployed. We make use of the OWASP cross-site scripting prevention rules as guideline in our approach. The proposed approach is, so far, only implemented and validated on Java-based Web applications, although it can be implemented in other programming languages with slight modifications. Initial evaluation results have indicated promising results.Keywords
Cross-Site Scripting, Software Security, Vulnerability Removal- Cross-Site Scripting Detection Based on an Enhanced Genetic Algorithm
Abstract Views :139 |
PDF Views:0
Authors
Affiliations
1 Department of Software Engineering and Information System, Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, UPM, Serdang - 43400, Selangor, MY
1 Department of Software Engineering and Information System, Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, UPM, Serdang - 43400, Selangor, MY
Source
Indian Journal of Science and Technology, Vol 8, No 30 (2015), Pagination:Abstract
Software security vulnerabilities have led to many successful attacks on applications, especially web applications, on a daily basis. These attacks, including cross-site scripting, have caused damages for both web site owners and users. Cross-site scripting vulnerabilities are easy to exploit but difficult to mitigate. Many solutions have been proposed for their detection. However, the problem of cross-site scripting vulnerabilities present in web applications still persists. In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. The proposed approach is, so far, only implemented and validated on Java-based web applications, although it can be implemented in other programming languages with slight modifications. Initial evaluations have indicated promising results.Keywords
Cross-Site Scripting, Genetic Algorithm, Software Security, Vulnerability Detection- SQL Injection Attack Roadmap and Fusion
Abstract Views :204 |
PDF Views:0
Authors
Kabir Umar
1,
Abu Bakar Md Sultan
1,
Hazura Zulzalil
1,
Novia Admodisastro
1,
Mohd Taufik Abdullah
1
Affiliations
1 Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Serdang, Selangor, MY
1 Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Serdang, Selangor, MY
Source
Indian Journal of Science and Technology, Vol 9, No 28 (2016), Pagination:Abstract
With SQL Injection, an attacker can change the intended effect of dynamically generated query in a web Application. This can lead to unauthorized access to the database underlying web application, and harmful transactions on the potentially sensitive information contained in the database. Clear understanding of a problem always assists in finding stronger solution to the problem. In this paper, we conducted an extensive review of several empirical studies on SQL injection attacks and vulnerabilities, with the goal of providing the research community with better insight into possible relationship that exists between different types of SQL Injection Attacks (SQLIAs), and the types of vulnerabilities exploited by each. Consequently, the result of our study is presentation of SQLIAs fusion which shows how different types of SQLIAs lead to one another, and also presentation of step by step SQLIA roadmap. We are very optimistic that our study can help the research community with clearer understanding of SQL Injections, and thus facilitates emergence of stronger solutions to the long standing problem.Keywords
Attack Intents, Attack Mechanism, Inter-attacks Relationship, Vulnerabilities Exploitation, Web Applications.- Enhanced Pushdown Automaton based Static Analysis for Detection of SQL Injection Hotspots in Web Application
Abstract Views :204 |
PDF Views:0
Authors
Kabir Umar
1,
Abu Bakar Md Sultan
1,
Hazura Zulzalil
1,
Novia Admodisastro
1,
Mohd Taufik Abdullah
1
Affiliations
1 Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Serdang, Selangor, MY
1 Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Serdang, Selangor, MY