WIVET - Benchmarking Coverage Qualities of Web Crawlers

[1]  Bengt Jonsson,et al.  Regular Inference for State Machines Using Domains with Equality Tests , 2008, FASE.

[2]  Benjamin Livshits Defining a Set of Common Benchmarks for Web Application Security , 2005 .

[3]  Marco Vieira,et al.  Testing and Comparing Web Vulnerability Scanning Tools for SQL Injection and XSS Attacks , 2007 .

[4]  Jayant Madhavan,et al.  Google's Deep Web crawl , 2008, Proc. VLDB Endow..

[5]  Marco Vieira,et al.  Benchmarking Vulnerability Detection Tools for Web Services , 2010, 2010 IEEE International Conference on Web Services.

[6]  Shian-Shyong Tseng,et al.  W-VST: A Testbed for Evaluating Web Vulnerability Scanner , 2014, 2014 14th International Conference on Quality Software.

[7]  Peter Kok Keong Loh,et al.  Fuzzy Classification Metrics for Scanner Assessment and Vulnerability Reporting , 2010, IEEE Transactions on Information Forensics and Security.

[8]  Christopher Krügel,et al.  Pixy: a static analysis tool for detecting Web application vulnerabilities , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[9]  M. Alvarez,et al.  Client-side deep Web data extraction , 2004, IEEE International Conference on E-Commerce Technology for Dynamic E-Business.

[10]  Laurie A. Williams,et al.  One Technique is Not Enough: A Comparison of Vulnerability Discovery Techniques , 2011, 2011 International Symposium on Empirical Software Engineering and Measurement.

[11]  Christopher Krügel,et al.  Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner , 2012, USENIX Security Symposium.

[12]  Eric Medvet,et al.  Recording and Replaying Navigations on AJAX Web Sites , 2012, ICWE.

[13]  Aleksandra Mileva,et al.  EVALUATION AND TESTING OF SEVERAL FREE/OPEN SOURCE WEB VULNERABILITY SCANNERS , 2013 .

[14]  Pavol Zavarsky,et al.  Testing and assessing web vulnerability scanners for persistent SQL injection attacks , 2011, IWSEC 2011.

[15]  John C. Mitchell,et al.  State of the Art: Automated Black-Box Web Application Vulnerability Testing , 2010, 2010 IEEE Symposium on Security and Privacy.

[16]  Ken Moody,et al.  SharpSpider: spidering the Web through Web services , 2003, Proceedings of the IEEE/LEOS 3rd International Conference on Numerical Simulation of Semiconductor Optoelectronic Devices (IEEE Cat. No.03EX726).

[17]  Arie van Deursen,et al.  Crawling Ajax-Based Web Applications through Dynamic Analysis of User Interface State Changes , 2012, TWEB.

[18]  Juliana Freire,et al.  An adaptive crawler for locating hidden-Web entry points , 2007, WWW '07.

[19]  Arie van Deursen,et al.  Invariant-Based Automatic Testing of Modern Web Applications , 2012, IEEE Transactions on Software Engineering.

[20]  Christopher Krügel,et al.  SecuBat: a web vulnerability scanner , 2006, WWW '06.

[21]  Victor Carneiro,et al.  Crawling the Content Hidden Behind Web Forms , 2007, ICCSA.

[22]  Toshinori Sato,et al.  Power-Performance Trade-Off of a Dependable Multicore Processor , 2007 .

[23]  Giovanni Vigna,et al.  Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners , 2010, DIMVA.