Skip to main content

Automatic Test Approach of Web Application for Security (AutoInspect)

  • Conference paper
Computational Science and Its Applications - ICCSA 2006 (ICCSA 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3983))

Included in the following conference series:

Abstract

We present an automatic test approach to improve the security of web application, which detects vulnerable spots based on black box test through three phases of craw, test, and report. The test process considers a blind point for security through the development life cycle, the faults of web application and server setup in a various point of attackers, etc. The test approach is applied to the web applications in industry, analyzed, and compared with the existing test tool.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Achilles: Web Application Proxy Tool, http://www.owasp.org

  2. Appscan: Web Application Testing Tool, http://www.watchfire.com

  3. Arkin, B., Stender, S., McGraw, G.: Software Penetration Testing. IEEE Security & Privacy 3(1), 84–87 (2005)

    Article  Google Scholar 

  4. AppsecInc: Manipulating Microsoft SQL Server Using SQL Injection (2002), http://www.appsecInc.com/presentations/Manipulating_SQL_Server_Using_SQL_Injection.pdf

  5. Auronen, L.: Tool-Based Approach to Assessing Web Application Security. Helsinki University of Technology (2002)

    Google Scholar 

  6. Borgelt, C., Kruse, R.: Induction of Association Rules: Apriori Implementation. In: 15th Conference on Computational Statistics Compstat, Berlin, Germany (2002)

    Google Scholar 

  7. CgiSecurity: CA-2000-02 Malicious HTML Tags Embedded in Client Web Requests (2002), http://www.cgisecurity.com/articles/xss-faq.shtml

  8. Ghosh, A.K., McGraw, G.: An Approach for Certifying Security in Software Components. In: Proceedings of the 21st National Information Systems Security Conference, Crystal City, VA, October 5-8 (1998)

    Google Scholar 

  9. Heineman, K.: Building Web Application Security into Your Development Process (2003), http://www.spidynamics.com/whitepapers/Webapp_Dev_Process.pdf

  10. Multi-criterion decision-making, http://ecolu-info.unige.ch/~dubois/Mutate_final/Lectures/Lect131/lect131.htm

  11. Noriyuki, M., Ken, N.: Interactive Support for Decision Making. Institute Policy and Planning Sciences, Univ. of Tsukuba, Nissan Motor, Co. Ltd. Nissan Technical Center

    Google Scholar 

  12. NGS Software: Advanced SQL Injection In SQL Server Applications (2002), http://www.nextgenss.com/papers/advanced_sql_injection.pdf

  13. OWASP: Top 10 Most Critical Web Application Security Vulnerabilities (2004), http://www.owasp.org/documentation/topten.html

  14. Scando: Web Application Testing Tool, http://www.kavado.com

  15. SecurityFocus: Black Box Test Method, http://www.securityfocus.com/infocus/1709

  16. Hoo, K.S., Sudbury, A.W., Jaquith, A.R.: Tangible ROI through Secure Software Engineering. Secure Business Quarterly 1(2) (2001)

    Google Scholar 

  17. WebInspect: Web Application Testing Tool, http://www.spidynamics.com

  18. WebScrab: Web Application Testing Tool, http://www.owasp.org

  19. Wen, Y., Kun, S., Lin, T.P.: Web Application Security Assessment by Fault Injection and Behavior Monitoring. In: The 12th International W3 Conference, Budapest, Hungary, May 20-24 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Choi, K.C., Lee, G.H. (2006). Automatic Test Approach of Web Application for Security (AutoInspect). In: Gavrilova, M.L., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3983. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751632_72

Download citation

  • DOI: https://doi.org/10.1007/11751632_72

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34077-5

  • Online ISBN: 978-3-540-34078-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics