منابع مشابه
VmiCVS: Cloud Vulnerability Scanner
Every service that runs in cloud systems comes with its own set of vulnerabilities. It is important to detect and assess those vulnerabilities to provide seamless and secure service to the users. Various scanners such as Port scanner, Network scanner, Web application security scanner, Database security scanner, Host based vulnerability scanner etc provide security assessment. But these scanners...
متن کاملINVUS: INtelligent VUlnerability Scanner
This paper presents a new vulnerability scanning model named as INVUS, which contains aspects of both network and host-based vulnerability scanners. INVUS model has client/server architecture and provides an option to repair the found vulnerabilities by working with the firewall.
متن کاملA Survey on Security Properties and Web Application Scanner
Web application is one of the most powerful communication channel and service providers for information delivery over internet today. Open Web Application Security Project is the top 10 vulnerability list that resulted more number of attacks in the websites in the few years. The main objective is to find out the effectiveness in detecting the vulnerability in web application. The main motive of...
متن کاملEnemy of the State: A State-Aware Black-Box Web Vulnerability Scanner
Black-box web vulnerability scanners are a popular choice for finding security vulnerabilities in web applications in an automated fashion. These tools operate in a point-and-shootmanner, testing any web application— regardless of the server-side language—for common security vulnerabilities. Unfortunately, black-box tools suffer from a number of limitations, particularly when interacting with c...
متن کاملA String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically executing the target system and constructing constraints for matching path conditions and attack patterns. Clearly, the constraint solving technique is the key to the above research. This paper presents Simple Linear String...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal for Research in Applied Science and Engineering Technology
سال: 2019
ISSN: 2321-9653
DOI: 10.22214/ijraset.2019.6066