An approach for cross-site scripting detection and removal based on genetic algorithms.
Software security vulnerabilities have led to many successful attacks on applications, on a daily basis. These attacks, including cross-site scripting, have caused damages for both web site owners and users. Cross-site scripting vulnerabilities are easy to exploit but difficult to eliminate. Many so...
| Main Authors: | Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2014
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/32711/ http://psasir.upm.edu.my/id/eprint/32711/1/32711.pdf |
Similar Items
Cross-site scripting detection based on an enhanced genetic algorithm
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
The limitations of cross-site scripting vulnerabilities detection and removal techniques
by: Hydara, Isatou, et al.
Published: (2021)
by: Hydara, Isatou, et al.
Published: (2021)
Towards removing cross-site scripting vulnerabilities from mobile web applications
by: Hydara, Isatou, et al.
Published: (2018)
by: Hydara, Isatou, et al.
Published: (2018)
Towards cross-site scripting vulnerability detection in mobile web applications
by: Hydara, Isatou, et al.
Published: (2018)
by: Hydara, Isatou, et al.
Published: (2018)
Removing cross-site scripting vulnerabilities from web applications using the OWASP ESAPI security guidelines
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Removing cross-site scripting vulnerabilities from web applications using the OWASP ESAPI security guidelines
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Security impact of cross-site scripting vulnerabilities on web applications and their awareness
by: Hydara, Isatou, et al.
Published: (2022)
by: Hydara, Isatou, et al.
Published: (2022)
Current state of research on cross-site scripting (XSS) – a systematic literature review
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
by: Hydara, Isatou
Published: (2015)
by: Hydara, Isatou
Published: (2015)
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
by: Hydara, Isatou
Published: (2024)
by: Hydara, Isatou
Published: (2024)
Secure coding in cross site scripting
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
Comparing web vulnerability scanners with a new method for SQL injection vulnerabilities detection and removal EPSQLiFix
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
Preventing persistent cross-site scripting (XSS) attack by applying pattern filtering approach
by: Yusof, Imran, et al.
Published: (2014)
by: Yusof, Imran, et al.
Published: (2014)
Mitigating cross-site scripting attacks with a content security Policy
by: Yusof, Imran, et al.
Published: (2016)
by: Yusof, Imran, et al.
Published: (2016)
Automatic generation of content security policy to mitigate cross site scripting
by: Mhana, Samer Attallah, et al.
Published: (2016)
by: Mhana, Samer Attallah, et al.
Published: (2016)
Prevention of attack on Islamic websites by fixing SQL injection vulnerabilities using co-evolutionary search approach
by: Umar, Kabir, et al.
Published: (2014)
by: Umar, Kabir, et al.
Published: (2014)
Enhanced pushdown automaton based static analysis for detection of SQL injection Hotspots in web application
by: Umar, Kabir, et al.
Published: (2016)
by: Umar, Kabir, et al.
Published: (2016)
Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model
by: Kareem Thajeel, Isam, et al.
Published: (2023)
by: Kareem Thajeel, Isam, et al.
Published: (2023)
Genetic algorithm application for enhancing state-sensitivity partitioning
by: Mohammed Sultan, Ammar, et al.
Published: (2015)
by: Mohammed Sultan, Ammar, et al.
Published: (2015)
Adopting genetic algorithm to enhance state-sensitivity partitioning
by: Sultan, Ammar Mohammed, et al.
Published: (2015)
by: Sultan, Ammar Mohammed, et al.
Published: (2015)
On the automation of vulnerabilities fixing for web application
by: Umar, Kabir, et al.
Published: (2014)
by: Umar, Kabir, et al.
Published: (2014)
SQL Injection attack roadmap and fusion
by: Umar, Kabir, et al.
Published: (2016)
by: Umar, Kabir, et al.
Published: (2016)
An approach for vulnerability detection in web applications using graph neural networks and transformers
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
Defining fitness function for search based assessment of grammar reachability
by: Umar, Kabir, et al.
Published: (2018)
by: Umar, Kabir, et al.
Published: (2018)
Japanese approaches to multi-script database provision
by: Wells, David
Published: (1998)
by: Wells, David
Published: (1998)
Home (Script)
by: Brown Ash, M., et al.
Published: (2015)
by: Brown Ash, M., et al.
Published: (2015)
Comparison of security testing approaches for detection of SQL injection vulnerabilities
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)
Gap analysis in specifying porting requirements for mobile application
by: Rajadorai, Kesava Pillai, et al.
Published: (2016)
by: Rajadorai, Kesava Pillai, et al.
Published: (2016)
A genetic algorithm approach for timetabling problem: the time group strategy
by: Md Sultan, Abu Bakar, et al.
Published: (2004)
by: Md Sultan, Abu Bakar, et al.
Published: (2004)
Hybrid genetic algorithm for improving fault localization
by: Mahamad Zakaria, Muhammad Luqman, et al.
Published: (2018)
by: Mahamad Zakaria, Muhammad Luqman, et al.
Published: (2018)
Feedforward backpropagation, genetic algorithm approaches for predicting reference evapotranspiration
by: Shafika Sultan Abdullah,, et al.
Published: (2015)
by: Shafika Sultan Abdullah,, et al.
Published: (2015)
Inconsistency detection of model and code via critic-based approach
by: Mohammed, Osman, et al.
Published: (2017)
by: Mohammed, Osman, et al.
Published: (2017)
An Arabic Script Recognition System
by: Alginahi, Yasser M., et al.
Published: (2015)
by: Alginahi, Yasser M., et al.
Published: (2015)
Skew detection and correction of mushaf Al-Quran script using hough transform
by: Bafjaish, Salem Saleh, et al.
Published: (2018)
by: Bafjaish, Salem Saleh, et al.
Published: (2018)
Enhancing software effort estimation in the analogy-based approach through the combination of regression methods
by: Javdani Gandomani, Taghi, et al.
Published: (2024)
by: Javdani Gandomani, Taghi, et al.
Published: (2024)
Automatic multi-lingual script recognition application
by: Abdel Karim Abu-Ain, Waleed, et al.
Published: (2018)
by: Abdel Karim Abu-Ain, Waleed, et al.
Published: (2018)
New journalism in documentary script writing
by: Indra, Syirfan, et al.
Published: (2023)
by: Indra, Syirfan, et al.
Published: (2023)
An architecture analysis approach for supporting black-box software development.
by: Admodisastro, Novia Indriaty, et al.
Published: (2011)
by: Admodisastro, Novia Indriaty, et al.
Published: (2011)
Crossover and mutation operators of genetic algorithms
by: Lim, Siew Mooi, et al.
Published: (2017)
by: Lim, Siew Mooi, et al.
Published: (2017)
Crossover and mutation operators of genetic algorithms
by: Siew, Mooi Lim, et al.
Published: (2017)
by: Siew, Mooi Lim, et al.
Published: (2017)
Similar Items
-
Cross-site scripting detection based on an enhanced genetic algorithm
by: Hydara, Isatou, et al.
Published: (2015) -
The limitations of cross-site scripting vulnerabilities detection and removal techniques
by: Hydara, Isatou, et al.
Published: (2021) -
Towards removing cross-site scripting vulnerabilities from mobile web applications
by: Hydara, Isatou, et al.
Published: (2018) -
Towards cross-site scripting vulnerability detection in mobile web applications
by: Hydara, Isatou, et al.
Published: (2018) -
Removing cross-site scripting vulnerabilities from web applications using the OWASP ESAPI security guidelines
by: Hydara, Isatou, et al.
Published: (2015)