Static analysis of source code is used for auditing web applications to detect the vulnerabilities. In this paper, we propose a new algorithm to analyze the PHP source code for detecting LFI and RFI potential vulnerabilities. In our approach, we first define some patterns for finding some functions which have potential to be abused because of unhandled user inputs. More precisely, we use regular expression as a fast and simple method to define some patterns for detection of vulnerabilities. As inclusion functions could be also used in a safe way, there could occur many false positives (FP). The first cause of these FP-s could be that the function does not use a usersupplied variable as an argument. So, we extract a list of usersupplied vari...
With the widespread adoption of dynamic web applications in recent years, a number of threats to the...
Current static detection technology for web application vulnerabilities relies highly on specific vu...
We compared vulnerable and fixed versions of the source code of 50 different PHP open source project...
Abstract—The World Wide Web grew rapidly during the last decades and is used by millions of people e...
The importance of Web applications has increased continually in recent years. As more and more servi...
We present a novel method for static analysis in which we combine data-flow analysis with machine le...
The number and the importance of Web applications have increased rapidly over the last years. At the...
Increasingly, web applications handle sensitive data and interface with critical back-end components...
Unrestricted file upload vulnerabilities enable attackers to upload malicious scripts to a web serve...
Unrestricted file upload vulnerabilities enable attackers to upload malicious scripts to a web serve...
Possibly, reason for that insecurity of web applications is the fact many programmers lack appropria...
International audienceWeb applications use authentication mechanisms to provide user-friendly conten...
This paper is intended to be a summary of the ideas provided by Yichen Xie & Alex Aiken [1]. The...
Abstract—In recent years, focus of business world has been moved towards the Internet. Web applicati...
Memory corruption vulnerabilities that lead to control-flow hijacking attacks are a common problem f...
With the widespread adoption of dynamic web applications in recent years, a number of threats to the...
Current static detection technology for web application vulnerabilities relies highly on specific vu...
We compared vulnerable and fixed versions of the source code of 50 different PHP open source project...
Abstract—The World Wide Web grew rapidly during the last decades and is used by millions of people e...
The importance of Web applications has increased continually in recent years. As more and more servi...
We present a novel method for static analysis in which we combine data-flow analysis with machine le...
The number and the importance of Web applications have increased rapidly over the last years. At the...
Increasingly, web applications handle sensitive data and interface with critical back-end components...
Unrestricted file upload vulnerabilities enable attackers to upload malicious scripts to a web serve...
Unrestricted file upload vulnerabilities enable attackers to upload malicious scripts to a web serve...
Possibly, reason for that insecurity of web applications is the fact many programmers lack appropria...
International audienceWeb applications use authentication mechanisms to provide user-friendly conten...
This paper is intended to be a summary of the ideas provided by Yichen Xie & Alex Aiken [1]. The...
Abstract—In recent years, focus of business world has been moved towards the Internet. Web applicati...
Memory corruption vulnerabilities that lead to control-flow hijacking attacks are a common problem f...
With the widespread adoption of dynamic web applications in recent years, a number of threats to the...
Current static detection technology for web application vulnerabilities relies highly on specific vu...
We compared vulnerable and fixed versions of the source code of 50 different PHP open source project...