期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
路径条件生成中的优化策略 被引量:1
1
作者 于亚南 周喜 《计算机工程与设计》 CSCD 北大核心 2012年第10期3995-3998,4003,共5页
为了提高利用符号执行生成测试数据的效率,提出了一种结合传统前向遍历和后向遍历的方法。通过对传统前向遍历和后向遍历方式的优缺点进行对比分析,设计了一个结合二者优点的算法。该算法将程序分块处理,整体采用前向遍历的思想,但在每... 为了提高利用符号执行生成测试数据的效率,提出了一种结合传统前向遍历和后向遍历的方法。通过对传统前向遍历和后向遍历方式的优缺点进行对比分析,设计了一个结合二者优点的算法。该算法将程序分块处理,整体采用前向遍历的思想,但在每一个块中是后向遍历代码的;它兼具前向遍历较早发现不可达路径的优点和后向遍历可以避免不相关变量赋值的优点,解决了传统前向遍历中的冗余问题。实验结果表明了该方法的可行性和有效性。 展开更多
关键词 符号执行 路径条件 前向遍历 后向遍历 依赖变量
下载PDF
Web Security:Emerging Threats and Defense
2
作者 Abdulwahed Awad Almutairi Shailendra Mishra Mohammed AlShehri 《Computer Systems Science & Engineering》 SCIE EI 2022年第3期1233-1248,共16页
Web applications have become a widely accepted method to support the internet for the past decade.Since they have been successfully installed in the business activities and there is a requirement of advanced functiona... Web applications have become a widely accepted method to support the internet for the past decade.Since they have been successfully installed in the business activities and there is a requirement of advanced functionalities,the configuration is growing and becoming more complicated.The growing demand and complexity also make these web applications a preferred target for intruders on the internet.Even with the support of security specialists,they remain highly problematic for the complexity of penetration and code reviewing methods.It requires considering different testing patterns in both codes reviewing and penetration testing.As a result,the number of hacked websites is increasing day by day.Most of these vulnerabilities also occur due to incorrect input validation and lack of result validation for lousy programming practices or coding errors.Vulnerability scanners for web applications can detect a few vulnerabilities in a dynamic approach.These are quite easy to use;however,these often miss out on some of the unique critical vulnerabilities in a different and static approach.Although these are time-consuming,they can find complex vulnerabilities and improve developer knowledge in coding and best practices.Many scanners choose both dynamic and static approaches,and the developers can select them based on their requirements and conditions.This research explores and provides details of SQL injection,operating system command injection,path traversal,and cross-site scripting vulnerabilities through dynamic and static approaches.It also examines various security measures in web applications and selected five tools based on their features for scanning PHP,and JAVA code focuses on SQL injection,cross-site scripting,Path Traversal,operating system command.Moreover,this research discusses the approach of a cyber-security tester or a security developer finding out vulnerabilities through dynamic and static approaches using manual and automated web vulnerability scanners. 展开更多
关键词 SQL injection attack cross-site scripting attack command injection attack path traversal attack
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部