메뉴 건너뛰기




Volumn 8, Issue 2, 2015, Pages 269-283

Assessing and Comparing Vulnerability Detection Tools for Web Services: Benchmarking Approach and Examples

Author keywords

Benchmarking; penetration testing; runtime anomaly detection; static analysis; vulnerability detection

Indexed keywords

BENCHMARKING; CONCRETES; INSPECTION EQUIPMENT; SOCIAL NETWORKING (ONLINE); STATIC ANALYSIS; WEBSITES; WORLD WIDE WEB;

EID: 84927724623     PISSN: 19391374     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSC.2014.2310221     Document Type: Article
Times cited : (61)

References (37)
  • 9
    • 77649285593 scopus 로고    scopus 로고
    • Comparing the Effectiveness of Penetration Testing and Static Code Analysis on the Detection of SQL Injection Vulnerabilities in Web Services
    • N. Antunes and M. Vieira, "Comparing the Effectiveness of Penetration Testing and Static Code Analysis on the Detection of SQL Injection Vulnerabilities in Web Services," Proc. 15th IEEE Pacific Rim Int'l Symp. Dependable Computing (PRDC '09), pp. 301-306, 2009.
    • (2009) Proc. 15th IEEE Pacific Rim Int'l Symp. Dependable Computing (PRDC '09) , pp. 301-306
    • Antunes, N.1    Vieira, M.2
  • 19
    • 84923564816 scopus 로고    scopus 로고
    • Finding Security Vulnerabilities in Java Applications with Static Analysis
    • V.B. Livshits and M.S. Lam, "Finding Security Vulnerabilities in Java Applications with Static Analysis," Proc. 14th Conf. USENIX Security Symp., vol. 14, pp. 18-18, 2005.
    • (2005) Proc. 14th Conf. USENIX Security Symp. , vol.14 , pp. 18-18
    • Livshits, V.B.1    Lam, M.S.2
  • 27
    • 26044480846 scopus 로고    scopus 로고
    • Supporting Controlled Experimentation with Testing Techniques: An Infrastructure and its Potential Impact
    • Oct.
    • H. Do, S. Elbaum, and G. Rothermel, "Supporting Controlled Experimentation with Testing Techniques: An Infrastructure and its Potential Impact," Empirical Software Eng., vol. 10, no. 4, pp. 405-435, Oct. 2005.
    • (2005) Empirical Software Eng. , vol.10 , Issue.4 , pp. 405-435
    • Do, H.1    Elbaum, S.2    Rothermel, G.3
  • 30
    • 0036328418 scopus 로고    scopus 로고
    • Unraveling the Web services Web: An Introduction to SOAP, WSDL, and UDDI
    • Mar./Apr.
    • F. Curbera, M. Duftler, R. Khalaf, W. Nagy, N. Mukhi, and S. Weerawarana, "Unraveling the Web services Web: An Introduction to SOAP, WSDL, and UDDI," IEEE Internet Computing, vol. 6, no. 2, pp. 86-93, Mar./Apr. 2002.
    • (2002) IEEE Internet Computing , vol.6 , Issue.2 , pp. 86-93
    • Curbera, F.1    Duftler, M.2    Khalaf, R.3    Nagy, W.4    Mukhi, N.5    Weerawarana, S.6
  • 31
    • 14744271696 scopus 로고    scopus 로고
    • Software Penetration Testing
    • Jan./Feb.
    • B. Arkin, S. Stender, and G. McGraw, "Software Penetration Testing," IEEE Security & Privacy, vol. 3, no. 1, pp. 84-87, Jan./Feb. 2005.
    • (2005) IEEE Security & Privacy , vol.3 , Issue.1 , pp. 84-87
    • Arkin, B.1    Stender, S.2    McGraw, G.3
  • 35
    • 84876379611 scopus 로고    scopus 로고
    • Campwood Software, "SourceMonitor Version 2.5," http://www.campwoodsw.com/sourcemonitor.html, 2008.
    • (2008) SourceMonitor Version 2.5
  • 37
    • 80053169173 scopus 로고    scopus 로고
    • Enhancing Penetration Testing with Attack Signatures and Interface Monitoring for the Detection of Injection Vulnerabilities in Web Services
    • N. Antunes and M. Vieira, "Enhancing Penetration Testing with Attack Signatures and Interface Monitoring for the Detection of Injection Vulnerabilities in Web Services," Proc. IEEE Int'l Conf. Services Computing (SCC), pp. 104-111, 2011.
    • (2011) Proc. IEEE Int'l Conf. Services Computing (SCC) , pp. 104-111
    • Antunes, N.1    Vieira, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.