메뉴 건너뛰기




Volumn 48, Issue 5, 2005, Pages 739-761

A testing framework for Web application security assessment

Author keywords

Black box testing; Complete crawling; Fault injection; Security assessment; Web application testing

Indexed keywords

AUTOMATION; COMPUTER NETWORKS; COMPUTER SOFTWARE; ERROR CORRECTION; FAULT TREE ANALYSIS; REAL TIME SYSTEMS; SECURITY OF DATA;

EID: 18844454053     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2005.01.003     Document Type: Article
Times cited : (57)

References (73)
  • 1
    • 84880352802 scopus 로고    scopus 로고
    • eSafe Proactive Content Security
    • Aladdin Knowledge Systems, eSafe Proactive Content Security, Available from:
    • Aladdin Knowledge Systems
  • 2
    • 18844415995 scopus 로고    scopus 로고
    • Mobile code stakes its claim
    • Cover Story, November
    • I. Armstrong, Mobile code stakes its claim, SC Magazine, Cover Story, November 2000
    • (2000) SC Magazine
    • Armstrong, I.1
  • 10
    • 16244377358 scopus 로고    scopus 로고
    • Knowledge area description of software testing
    • Chapter 5, Software Engineering Coordinated Committee (Joint IEEE Computer Society-ACM Committee), April
    • A. Bertolino, Knowledge area description of software testing, in: Guide to the Software Engineering Body of Knowledge SWEBOK (v. 0.7), Chapter 5, Software Engineering Coordinated Committee (Joint IEEE Computer Society-ACM Committee), April, 2000. Available from: < http://www.swebok.org>
    • (2000) Guide to the Software Engineering Body of Knowledge SWEBOK (V. 0.7)
    • Bertolino, A.1
  • 12
    • 16244394407 scopus 로고    scopus 로고
    • Bulletproof web security
    • TechTarget Storage Media May
    • M. Bobbitt, Bulletproof web security, Network Security Magazine, TechTarget Storage Media, May 2002. Available from: < http://infosecuritymag. techtarget.com/2002/may/bulletproof.shtml>
    • (2002) Network Security Magazine
    • Bobbitt, M.1
  • 14
    • 18844425345 scopus 로고    scopus 로고
    • On preventing intrusions by process behavior monitoring
    • Washington, DC, August
    • T. Bowen, M. Segal, R. Sekar, On preventing intrusions by process behavior monitoring, in: Eighth USENIX Security Symposium, Washington, DC, August 1999
    • (1999) Eighth USENIX Security Symposium
    • Bowen, T.1    Segal, M.2    Sekar, R.3
  • 19
    • 18844398744 scopus 로고    scopus 로고
    • DHTML Central, HierMenus. Available from: < http://www.webreference. com/dhtml/hiermenus/>
  • 23
    • 18844420132 scopus 로고    scopus 로고
    • HttpUnit
    • R. Gold, HttpUnit. Available from: < http://httpunit.sourceforge.net/ >
    • Gold, R.1
  • 27
    • 2442626107 scopus 로고    scopus 로고
    • Distributed search over the hidden Web: Hierarchical database sampling and selection
    • Hong Kong, China, August
    • P. Ipeirotis, L. Gravano, Distributed search over the hidden Web: hierarchical database sampling and selection, in: The 28th International Conference on Very Large Databases, Hong Kong, China, August 2002, pp. 394-405
    • (2002) The 28th International Conference on Very Large Databases , pp. 394-405
    • Ipeirotis, P.1    Gravano, L.2
  • 29
    • 4944265414 scopus 로고    scopus 로고
    • Specifying runtime environments and functionalities of downloadable components under the sandbox model
    • Kanazawa, Japan, November
    • H. Kaiya, K. Kaijiri, Specifying runtime environments and functionalities of downloadable components under the sandbox model, in: Proceedings of the International Symposium on Principles of Software Evolution, Kanazawa, Japan, November 2000, pp. 138-142
    • (2000) Proceedings of the International Symposium on Principles of Software Evolution , pp. 138-142
    • Kaiya, H.1    Kaijiri, K.2
  • 30
    • 19944389350 scopus 로고    scopus 로고
    • InterDo version 3.0
    • Kavado, Inc., InterDo Version 3.0., Kavado Whitepaper, 2003
    • (2003) Kavado Whitepaper
  • 37
    • 18844406885 scopus 로고    scopus 로고
    • MSDN Library
    • Microsoft, Scriptlet Security, Getting Started with Scriptlets, MSDN Library, 1997. Available from: < http://msdn.microsoft.com/library/default. asp?url=/library/en-us/dnindhtm/html/instantdhtmlscriptlets.asp>
    • (1997) Scriptlet Security, Getting Started with Scriptlets
  • 38
  • 39
    • 84880449926 scopus 로고    scopus 로고
    • Mozilla.org, Mozilla Layout Engine. Available from: < http://www.mozilla.org/newlayout/>
    • Mozilla Layout Engine
  • 40
    • 16244404145 scopus 로고    scopus 로고
    • Risks to the public in computers and related systems
    • P.G. Neumann Risks to the public in computers and related systems ACM SIGSOFT Software Engineering Notes 25 3 2000 15 23
    • (2000) ACM SIGSOFT Software Engineering Notes , vol.25 , Issue.3 , pp. 15-23
    • Neumann, P.G.1
  • 41
    • 16244377958 scopus 로고    scopus 로고
    • Netscape, JavaScript Security in Communicator 4.x. Available from: < http://developer.netscape.com/docs/manuals/communicator/jssec/contents. htm#1023448>
    • JavaScript Security in Communicator 4.x
  • 42
    • 0036497184 scopus 로고    scopus 로고
    • Quality attributes of web software applications
    • J. Offutt Quality attributes of web software applications IEEE Software 19 2 2002 25 32
    • (2002) IEEE Software , vol.19 , Issue.2 , pp. 25-32
    • Offutt, J.1
  • 44
    • 18844404268 scopus 로고    scopus 로고
    • OWASP, WebScarab Project. Available from: < http://www.owasp.org/ webscarab/>
  • 45
    • 18844405304 scopus 로고    scopus 로고
    • Active content security: Risks and solutions
    • Pelican Security Inc., Active content security: risks and solutions, Pelican Security Whitepaper, 1999
    • (1999) Pelican Security Whitepaper
  • 46
    • 18844435309 scopus 로고    scopus 로고
    • Making the net safe for ebusiness: Solving the problem of malicious Internet mobile code
    • Philiadelphia, Pennsylvania, September
    • P. Privateer, Making the net safe for ebusiness: solving the problem of malicious Internet mobile code, in: Proceedings of the eSolutions World 2000 Conference, Philiadelphia, Pennsylvania, September 2000
    • (2000) Proceedings of the ESolutions World 2000 Conference
    • Privateer, P.1
  • 49
    • 4243561781 scopus 로고    scopus 로고
    • Crawling the hidden web
    • Database Group, Computer Science Department, Stanford, November
    • S. Raghavan, H. Garcia-Molina, Crawling the hidden Web, in: Technical Report 2000-36, Database Group, Computer Science Department, Stanford, November 2000
    • (2000) Technical Report , vol.2000 , Issue.36
    • Raghavan, S.1    Garcia-Molina, H.2
  • 53
    • 0035306083 scopus 로고    scopus 로고
    • Understanding and restructuring Web sites with ReWeb
    • F. Ricca, and P. Tonella Understanding and restructuring Web sites with ReWeb IEEE Multimedia 8 2 2001 40 51
    • (2001) IEEE Multimedia , vol.8 , Issue.2 , pp. 40-51
    • Ricca, F.1    Tonella, P.2
  • 56
    • 18844436602 scopus 로고    scopus 로고
    • Sanctum Inc., AppShield 4.0 Whitepaper, 2002. Available from: < http://www.sanctuminc.com>
    • (2002) AppShield 4.0 Whitepaper
  • 59
    • 0036870155 scopus 로고    scopus 로고
    • Developing secure Web applications
    • D. Scott, and R. Sharp Developing secure Web applications IEEE Internet Computing 6 6 2002 38 45
    • (2002) IEEE Internet Computing , vol.6 , Issue.6 , pp. 38-45
    • Scott, D.1    Sharp, R.2
  • 60
    • 85084163313 scopus 로고    scopus 로고
    • Synthesizing fast intrusion detection/prevention systems from high-level specifications
    • R. Sekar, P. Uppuluri, Synthesizing fast intrusion detection/prevention systems from high-level specifications, in: USENIX Security Symposium, 1999
    • (1999) USENIX Security Symposium
    • Sekar, R.1    Uppuluri, P.2
  • 61
    • 18844378764 scopus 로고    scopus 로고
    • Larbin: A multi-purpose web crawler
    • Sebastien@ailleret.com, Larbin: A multi-purpose Web crawler. http://larbin.sourceforge.net/index-eng.html
    • Sebastien@ailleret.com
  • 62
    • 18844400981 scopus 로고    scopus 로고
    • SecurityGlobal.net April 2002-March
    • SecurityGlobal.net, Security Tracker Statistics, April 2002-March 2002. Available from: < http://securitytracker.com/learn/statistics.html>
    • (2002) Security Tracker Statistics
  • 66
    • 18844367044 scopus 로고    scopus 로고
    • Web application security assessment
    • SPI Dynamics, Web application security assessment, SPI Dynamics Whitepaper, 2003
    • (2003) SPI Dynamics Whitepaper
  • 67
    • 16244412523 scopus 로고    scopus 로고
    • Tennyson Maxwell Information Systems, Inc., Teleport Webspiders. Available from: < http://www.tenmax.com/teleport/home.htm>
    • Teleport Webspiders
  • 68
    • 0035001147 scopus 로고    scopus 로고
    • Evaluating the reverse engineering capabilities of Web tools for understanding site content and structure: A case study
    • Toronto, Ontario, Canada, May
    • S. Tilley, S. Huang, Evaluating the reverse engineering capabilities of Web tools for understanding site content and structure: A case study, in: Proceedings of the 23rd IEEE International Conference on Software Engineering, Toronto, Ontario, Canada, May 2001, pp. 514-523
    • (2001) Proceedings of the 23rd IEEE International Conference on Software Engineering , pp. 514-523
    • Tilley, S.1    Huang, S.2
  • 69
    • 18844426908 scopus 로고    scopus 로고
    • United States Patent and Trademark Office. Available from: < http://www.uspto.gov/patft/>
  • 71
    • 18844398743 scopus 로고    scopus 로고
    • AV alternatives: Extending scanner range
    • February
    • R. Vibert, AV alternatives: extending scanner range, in: Information Security Magazine, February 2001
    • (2001) Information Security Magazine
    • Vibert, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.