XML is a platform-independent data format applied in a vast number of applications. Starting with configuration files, up to office docu-ments, web applications and web services, this technology adopted nu-merous – mostly complex – extension specifications. As a consequence, a completely new attack scenario has raised by abusing weaknesses of XML-specific features. In the world of web applications, the security evaluation can be assured by the use of different penetration test tools. Nevertheless, compared to prominent attacks such as SQL-Injection or Cross-site scripting (XSS), there is currently no penetration test tool that is capable of analyzing the security of XML interfaces. In this paper we motivate for develop-ment of such a tool a...
The research is based on white box testing process that helps to analyze coding of software for veri...
The Internet has come a long way from its humble beginnings of being used as a simple way of transpo...
Input sanitization and validation of user inputs are well-established protection mechanisms for micr...
Abstract—XML-based SOAP Web Services are a widely used technology, which allows the users to execute...
XML is extensively used in web services for integration and data exchange. Its popularity and wide a...
Web Services (WS) Technology during the past few years for heterogeneous systems integration, has be...
peer reviewedIn most cases, web applications communicate with web services (SOAP and RESTful). The f...
peer reviewedModern enterprise systems can be composed of many web services (e.g., SOAP and RESTful)...
Web Services make it easy for organisations to participate in real time communication. The inevitabl...
Web services work over dynamic connections among distributed systems. This technology was specifical...
Web services are deployed using eXtensible Markup Language (XML), which is an independent language...
The thesis discusses the issues of penetration testing of web applications, focusing on the Cross-Si...
AbstractDue to its distributed and open nature, Web Services give rise to new security challenges. T...
Nowadays, the External Markup Language (XML) is the most commonly used technology in web services fo...
Abstract: XML Encryption and XML Signature are fundamental security standards forming the core for m...
The research is based on white box testing process that helps to analyze coding of software for veri...
The Internet has come a long way from its humble beginnings of being used as a simple way of transpo...
Input sanitization and validation of user inputs are well-established protection mechanisms for micr...
Abstract—XML-based SOAP Web Services are a widely used technology, which allows the users to execute...
XML is extensively used in web services for integration and data exchange. Its popularity and wide a...
Web Services (WS) Technology during the past few years for heterogeneous systems integration, has be...
peer reviewedIn most cases, web applications communicate with web services (SOAP and RESTful). The f...
peer reviewedModern enterprise systems can be composed of many web services (e.g., SOAP and RESTful)...
Web Services make it easy for organisations to participate in real time communication. The inevitabl...
Web services work over dynamic connections among distributed systems. This technology was specifical...
Web services are deployed using eXtensible Markup Language (XML), which is an independent language...
The thesis discusses the issues of penetration testing of web applications, focusing on the Cross-Si...
AbstractDue to its distributed and open nature, Web Services give rise to new security challenges. T...
Nowadays, the External Markup Language (XML) is the most commonly used technology in web services fo...
Abstract: XML Encryption and XML Signature are fundamental security standards forming the core for m...
The research is based on white box testing process that helps to analyze coding of software for veri...
The Internet has come a long way from its humble beginnings of being used as a simple way of transpo...
Input sanitization and validation of user inputs are well-established protection mechanisms for micr...