Quantitative assessment on remote code execution vulnerability in web apps
With the exponential increasing use of online tools, applications that are being made for day to day purpose by small and large industries, the threat of exploitation is also increasing. Remote Code Execution (RCE) is one of the top most critical and serious web applications vulnerability of this er...
| Main Authors: | Md. Maruf, Hassan, Umam, Mustain, Sabira, Khatun, Mohamad Shaiful, Abdul Karim, Nazia, Nishat, Mostafijur, Rahman |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English English |
| Published: |
Universiti Malaysia Pahang
2019
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/25982/ http://umpir.ump.edu.my/id/eprint/25982/1/34.%20Quantitative%20assessment%20on%20remote%20code%20execution%20vulnerability.pdf http://umpir.ump.edu.my/id/eprint/25982/2/34.1%20Quantitative%20assessment%20on%20remote%20code%20execution%20vulnerability.pdf |
Similar Items
Review and analysis of risk factor of maternal health in remote area using the Internet of Things (IoT)
by: Marzia, Ahmed, et al.
Published: (2020)
by: Marzia, Ahmed, et al.
Published: (2020)
Mobile Quran app security vulnerabilities
by: Talib, Shuhaili, et al.
Published: (2015)
by: Talib, Shuhaili, et al.
Published: (2015)
Compiling and executing Java code
by: Bhatti, Zeeshan, et al.
Published: (2011)
by: Bhatti, Zeeshan, et al.
Published: (2011)
Biologically Inspired Execution Framework for
Vulnerable Workflow Systems
by: Safdar, S., et al.
Published: (2009)
by: Safdar, S., et al.
Published: (2009)
Distributed t-way test suite execution with code coverage on multiple machines
by: Zainal Hisham, Che Soh, et al.
Published: (2017)
by: Zainal Hisham, Che Soh, et al.
Published: (2017)
Linked up web apps and web services
by: Nazar Syafiq, Nazri
Published: (2013)
by: Nazar Syafiq, Nazri
Published: (2013)
On the automation of vulnerabilities fixing for web application
by: Umar, Kabir, et al.
Published: (2014)
by: Umar, Kabir, et al.
Published: (2014)
Native Apps versus Web Apps: which is best for healthcare applications?
by: Selvarajah, Kirusnapillai, et al.
Published: (2013)
by: Selvarajah, Kirusnapillai, et al.
Published: (2013)
Determination Of Seismic Vulnerability Assessment By Using Rapid Screening Method Through Web-Based Application
by: Ooi, Jun Hao
Published: (2021)
by: Ooi, Jun Hao
Published: (2021)
Malware visualizer: A web apps malware family classification with machine learning
by: Mohd Zamri, Osman, et al.
Published: (2021)
by: Mohd Zamri, Osman, et al.
Published: (2021)
Vulnerability assessment in Malaysia government web-based application
by: Lau, Lee Keng
Published: (2020)
by: Lau, Lee Keng
Published: (2020)
Hybrid sampling and random forest machine learning approach for software detect prediction
by: Md. Anwar, Hossen, et al.
Published: (2019)
by: Md. Anwar, Hossen, et al.
Published: (2019)
Low bit rate video coding for remote desktop operation of CNC milling
by: Maarif, Haris Al Qodri, et al.
Published: (2011)
by: Maarif, Haris Al Qodri, et al.
Published: (2011)
Comparing web vulnerability scanners with a new method for SQL injection vulnerabilities detection and removal EPSQLiFix
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
Web user' knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Web users’ knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
An empirical comparison of commercial and open‐source web vulnerability scanners
by: Amankwah, Richard, et al.
Published: (2020)
by: Amankwah, Richard, et al.
Published: (2020)
Vulnerability Prevention Model for Web Browser using Interceptor Approach
by: Ahmad Khan, Nayeem, et al.
Published: (2015)
by: Ahmad Khan, Nayeem, et al.
Published: (2015)
Web-Based Reporting Vulnerabilities System for Cyber Security Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Material characterization model using rectangular resonator waveguide
by: Mohamad Shaiful, Abdul Karim, et al.
by: Mohamad Shaiful, Abdul Karim, et al.
Web and mobile app development for smart vehicle entrance & exit
by: Ong, Lip Wei
Published: (2023)
by: Ong, Lip Wei
Published: (2023)
Influence of coding variability in APP-Aß metabolism genes in sporadic Alzheimer's disease
by: Sassi, C., et al.
Published: (2016)
by: Sassi, C., et al.
Published: (2016)
Assessing the vulnerability of Kota Kinabalu buildings
by: Noor Sheena Herayani, Harith, et al.
Published: (2021)
by: Noor Sheena Herayani, Harith, et al.
Published: (2021)
Seismic vulnerability study of guillemard railway bridge
by: Teow, Ching Ching
Published: (2008)
by: Teow, Ching Ching
Published: (2008)
Path apps for box of ramadhan
by: Teng, Mee Ling, et al.
Published: (2019)
by: Teng, Mee Ling, et al.
Published: (2019)
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
Towards Vulnerability Prevention Model for Web Browser
using Interceptor Approach
by: Nayeem, Khan, et al.
Published: (2015)
by: Nayeem, Khan, et al.
Published: (2015)
Towards cross-site scripting vulnerability detection in mobile web applications
by: Hydara, Isatou, et al.
Published: (2018)
by: Hydara, Isatou, et al.
Published: (2018)
Security impact of cross-site scripting vulnerabilities on web applications and their awareness
by: Hydara, Isatou, et al.
Published: (2022)
by: Hydara, Isatou, et al.
Published: (2022)
Extreme heat vulnerability assessment in Peninsular Malaysia with integration of remote sensing and sociodemographic data
by: Ahmad Kamal, Nurfatin Izzati
Published: (2021)
by: Ahmad Kamal, Nurfatin Izzati
Published: (2021)
Pinkgola - restaurant finder mobile apps
by: Tiew, Kai Wen
Published: (2019)
by: Tiew, Kai Wen
Published: (2019)
A new dynamic code assignment algorithm for joint CDMA and SDMA system
by: Odeh, Nidhal A. S., et al.
Published: (2008)
by: Odeh, Nidhal A. S., et al.
Published: (2008)
Performance comparison of early breast cancer detection precision using ai and ultra-wideband (UWB) bio-antennas
by: Bari, Bifta Sama, et al.
Published: (2020)
by: Bari, Bifta Sama, et al.
Published: (2020)
Design And Simulation Of An Intelligent Adaptive Arbiter For Maximum Cpu Usage Of Multicore Processors
by: Akhtar, Mohammad Nishat
Published: (2013)
by: Akhtar, Mohammad Nishat
Published: (2013)
Homogeneous and heterogeneous breast phantoms for UWB imaging
by: Alshehri, Saleh, et al.
Published: (2011)
by: Alshehri, Saleh, et al.
Published: (2011)
Similar Items
-
Review and analysis of risk factor of maternal health in remote area using the Internet of Things (IoT)
by: Marzia, Ahmed, et al.
Published: (2020) -
Mobile Quran app security vulnerabilities
by: Talib, Shuhaili, et al.
Published: (2015) -
Compiling and executing Java code
by: Bhatti, Zeeshan, et al.
Published: (2011) -
Biologically Inspired Execution Framework for
Vulnerable Workflow Systems
by: Safdar, S., et al.
Published: (2009) -
Distributed t-way test suite execution with code coverage on multiple machines
by: Zainal Hisham, Che Soh, et al.
Published: (2017)