Match!

Automated server-side model for recognition of security vulnerabilities in scripting languages

Published on Dec 1, 2020in International Journal of Electrical and Computer Engineering
· DOI :10.11591/IJECE.V10I6.PP%P
Rabab Farouk Abdel-Kader2
Estimated H-index: 2
(Port Said University),
Mona Nashaat (Port Said University)+ 1 AuthorsHani Mahdi6
Estimated H-index: 6
(Ain Shams University)
Abstract
With the increase of global accessibility of web applications, maintaining a reasonable security level for both user data and server resources has become an extremely challenging issue. Therefore, static code analysis systems can help web developers to reduce time and cost. In this paper, a new static analysis model is proposed. This model is designed to discover the security problems in scripting languages. The proposed model is implemented in a prototype SCAT, which is a static code analysis Tool. SCAT applies the phases of the proposed model to catch security vulnerabilities in PHP 5.3. Empirical results attest that the proposed prototype is feasible and is able to contribute to the security of real-world web applications. SCAT managed to detect 94% of security vulnerabilities found in the testing benchmarks; this clearly indicates that the proposed model is able to provide an effective solution to complicated web systems by offering benefits of securing private data for users and maintaining web application stability for web applications providers.
  • References (0)
  • Citations (0)
📖 Papers frequently viewed together
2005
8 Citations
2015
3 Citations
2012
78% of Scinapse members use related papers. After signing in, all features are FREE.
References0
Newest
Cited By0
Newest