PowerPoint Presentation

Published on Slideshow
Static slideshow
Download PDF version
Download PDF version
Embed video
Share video
Ask about this video

Scene 1 (0s)

A Mapping Study of Security Vulnerability Detection Approaches for Web Applications.

Scene 2 (28s)

Introduction. Related works. Goal. Outline. Research Questions.

Scene 3 (1m 6s)

Web Application Security Vulnerabilities. Mapping Study.

Scene 4 (1m 57s)

Mapping study in web applications security vulnerabilities detection approaches. [Rafique et al.].

Scene 5 (2m 43s)

Identify, analyze, and synthesize the research published during the last twenty years in web application vulnerability detection..

Scene 6 (4m 16s)

Paper Selection Strategy. Publication search engine: IEEE Xplore, ACM Digital Library Year range: 2001 - 2021 PICO Population Intervention Comparison Outcomes.

Scene 7 (5m 6s)

Inclusion Criteria. Research articles were based on empirical evidence related to vulnerability detection methods of web applications.

Scene 8 (6m 1s)

Classification Scheme and Data Extraction. Attributes Contribution of the paper Research type of the paper Type of testing activity/technique Manual versus automated approach Static web application versus dynamic web application Presented tools in the Vulnerability typ addressed Publication year of citations Research question RQ 4 RQ 9.

Scene 9 (6m 35s)

Paper Count. Initial retrieve 150 paper Mapped 76 papers.

Scene 10 (6m 57s)

Results: RQ1. Types of contribution. Paper 10: [2] P. X. Mai, F. Pastore , A. Goknil and L. Briand, "Metamorphic Security Testing for Web Systems," 2020 IEEE 13th International Conference on Software Testing, Validation and Verification (ICST) , 2020, pp. 186-197, doi : 10.1109/ICST46399.2020.00028..

Scene 11 (7m 32s)

Results: RQ2. Types of research paper.

Scene 12 (7m 55s)

Results: RQ3. Types of testing techniques.

Scene 13 (8m 20s)

RQ 4-. 41-full automation.. 11 -fully manual.. Results.

Scene 14 (9m 18s)

Results: RQ7. Detection of security vulnerabilities from OWASP top 10.

Scene 15 (10m 14s)

Results: RQ8, RQ9. Paper 46: [3] J. Bau , E. Bursztein , D. Gupta and J. Mitchell, "State of the Art: Automated Black-Box Web Application Vulnerability Testing," 2010 IEEE Symposium on Security and Privacy , 2010, pp. 332-345, doi : 10.1109/SP.2010.27.

Scene 16 (11m 35s)

OWASP top ten vulnerability. Test oracle. Threats to the validity.

Scene 17 (13m 25s)

Thank You!.