Detection of XSS Vulnerabilities of Web Application Using Security Testing Approaches

[1]  Ruth Breu,et al.  Security Testing: A Survey , 2016, Adv. Comput..

[2]  Novia Admodisastro,et al.  Current state of research on cross-site scripting (XSS) - A systematic literature review , 2015, Inf. Softw. Technol..

[3]  Novia Admodisastro,et al.  Cross-site scripting detection based on an enhanced genetic algorithm , 2015 .

[4]  Mariano Ceccato,et al.  Comparison and integration of genetic algorithms and dynamic symbolic execution for security testing of cross-site scripting vulnerabilities , 2013, Inf. Softw. Technol..

[5]  Zhendong Su,et al.  Static detection of cross-site scripting vulnerabilities , 2008, 2008 ACM/IEEE 30th International Conference on Software Engineering.

[6]  Giovanni Agosta,et al.  Automated Security Analysis of Dynamic Web Applications through Symbolic Code Execution , 2012, 2012 Ninth International Conference on Information Technology - New Generations.

[7]  Mariano Ceccato,et al.  Security Testing of Web Applications: A Search-Based Approach for Cross-Site Scripting Vulnerabilities , 2011, 2011 IEEE 11th International Working Conference on Source Code Analysis and Manipulation.

[8]  Michael D. Ernst,et al.  Automatic creation of SQL Injection and cross-site scripting attacks , 2009, 2009 IEEE 31st International Conference on Software Engineering.

[9]  Zhi-jian Wang,et al.  Notice of RetractionA Static Analysis Tool for Detecting Web Application Injection Vulnerabilities for ASP Program , 2010, 2010 2nd International Conference on E-business and Information System Security.

[10]  Zarul Fitri Zaaba,et al.  Web Security: Detection of Cross Site Scripting in PHP Web Application using Genetic Algorithm , 2017 .

[11]  Moataz A. Ahmed,et al.  Multiple-path testing for cross site scripting using genetic algorithms , 2016, J. Syst. Archit..

[12]  Mariano Ceccato,et al.  Towards security testing with taint analysis and genetic algorithms , 2010, SESS '10.

[13]  Christopher Krügel,et al.  Static analysis for detecting taint-style vulnerabilities in web applications , 2010, J. Comput. Secur..