TITLE

Test Model for Security Vulnerability in Web Controls based on Fuzzing

AUTHOR(S)
Guoxiang Yao; Quanlong Guan; Kaibin Ni
PUB. DATE
April 2012
SOURCE
Journal of Software (1796217X);Apr2012, Vol. 7 Issue 4, p773
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
The number of Web controls' security vulnerability surged with ever-changing varieties of attacks. Therefore this paper analyzes test model for Web controls' vulnerability, and put forward a improved test model for Web controls' vulnerability. Be aimed to test vulnerability of Web ActiveX controls combining static analysis and dynamic analysis, as well as put forward a proposal of optimizing the generation engine for test data using ''heuristic rule''. Experiment results show that test model for Web controls' vulnerability based on fuzzing is effective and feasible, and it is able to manipulate interaction problems.
ACCESSION #
76109682

 

Related Articles

  • Chapter 7: Experiments with GHC's Optimiser. Németh, László // Trends in Functional Programming Volume 5;2006, Vol. 5, p97 

    There are several tricky aspects of compiling a functional language: what optimisations to perform, how to do them efficiently, and when, or more precisely in what order, the optimisations should be done. The literature discussing the first question is abundant, for the second is somewhat sparse...

  • Loop-Invariant Code Motion.  // Network Dictionary;2007, p294 

    An encyclopedia entry for "Loop-Invariant Code Motion" is presented. It is a compiler optimization technique that performs loop-variant code movement automatically to improve execution speed. Loop-invariant code in an imperative programming language is composed of statements which could be moved...

  • Strength Reduction.  // Network Dictionary;2007, p465 

    A definition of the term "Strength Reduction" in computer software is presented. The term refers to a compiler optimization where a function of some systematically changing variable is calculated more efficiently by using previous values of the function. In a procedural programming language,...

  • SOLVING OF SCHEDULING PROBLEM WITH HEURISTIC OPTIMIZATION APPROACH. ELEN, Abdullah; �AYIROGLU, Ibrahim // Teknoloji;2010, Vol. 13 Issue 3, p159 

    In this study, solution of course scheduling problems in student affairs automation used in the universities was carried out using Genetic Algorithm method which is one of Heuristic Optimization approaches. Scheduling problem is the process of placing the works to be done in time intervals at...

  • Development of algorithmic algebra tools to design parallel programs using heuristics. Doroshenko, A.; Kotyuk, N.; Nikolayev, S.; Tseytlin, G.; Yatsenko, E. // Cybernetics & Systems Analysis;Jul2010, Vol. 46 Issue 4, p653 

    The paper proposes a new approach and a system to develop parallel algorithms based on the joint use of the algebraic-algorithmic methodology of specification and development of programs and non-algorithmic (heuristic) techniques for code generation. The algebraic part of the methodology...

  • Toponym Disambiguation by Arborescent Relationships. Bensalem, Imene; Kholladi, Mohamed-Khireddine // Journal of Computer Science;2010, Vol. 6 Issue 6, p653 

    Problem statement: The way of referring to a place in the geographical space can be formal, based on the spatial coordinates, or informal, which we use in natural language by using toponyms (place names). A toponym can represent several geographical places. This ambiguity made problematic its...

  • EVALUATING COMMENT-TO-AST ASSIGNMENT HEURISTICS FOR C++ PROGRAMS. CSÉRI, TAMÁS; PORKOLÁB, ZOLTÁN // Studia Universitatis Babes-Bolyai, Informatica;May2014 Special Issue, Vol. 59, p75 

    Comments are integral part of the source code of software. They preserve the intentions of the developers, document constraints and highlight implementation details. Good comments help us to understand the codebase and make maintenance easier. Most of the software tools ignore comments because...

  • Acceptance and Use of Cross Language Information Retrieval System: An Empirical Study Based on TAM. Mavaluru, Dinesh; Shriram, R. // International Journal of Applied Engineering Research;2013, Vol. 8 Issue 14, p1649 

    Cross Language Information Retrieval systems employ heuristics to match results to user queries in user native language. Correctness of retrieved results cannot be formally proven, but must be evaluated through human assessment. The acceptance and use of a Cross Language Information Retrieval...

  • Applying Ontologies for Web Text Mining Using Heterogeneous Information. Suarez Barón, Marco Javier; Salinas Valencia, Kathleen Eliana; Cifuentes García, Carlos Andrés; Suárez Barón, Juan Carlos // International Journal of Information Processing & Management;Nov2014, Vol. 5 Issue 4, p18 

    Text mining is an effective means for the detection of potentially useful knowledge in large text documents. In this paper we apply an algorithm based on rules, together with traditional text mining technology, which cannot understand text semantics from the web through deductive rules via the...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics