SAISAN: An Automated Local File Inclusion Vulnerability Detection Model
نویسندگان
چکیده
منابع مشابه
Automated software vulnerability detection with machine learning
Thousands of security vulnerabilities are discovered in production software each year, either reported publicly to the Common Vulnerabilities and Exposures database or discovered internally in proprietary code. Vulnerabilities often manifest themselves in subtle ways that are not obvious to code reviewers or the developers themselves. With the wealth of open source code available for analysis, ...
متن کاملVulnerability Detection in ActiveX Controls through Automated Fuzz Testing
Vulnerabilities in ActiveX controls are frequently used by attackers to compromise systems using the Microsoft Internet Explorer web browser. A programming or design flaw in an ActiveX control can allow arbitrary code execution as the result of viewing a specially-crafted web page. In this paper, we examine effective techniques for fuzz testing ActiveX controls, using the Dranzer tool developed...
متن کاملA Machine-Oriented Integrated Vulnerability Database for Automated Vulnerability Detection and Processing
The number of security vulnerabilities discovered in computer systems has increased explosively. Currently, in order to keep track of security alerts, system administrators rely on vulnerability databases such as: CERT Coordination Centre, Securityfocus BugTraq and Sans Vulnerabilities Notes Database. Such databases are designed primarily to be read and understood by humans. Given the speed at ...
متن کاملTowards Automated Vulnerability Assessment
Vulnerability assessment (VA) is a well established method for determining security weaknesses within a system. The VA process is heavily reliant on expert knowledge, something that is attributed to being in short supply. This paper explores the possibility of automating VA and demonstrates an initial proof-of-concept involving decision-making skills comparable with a human-expert. This is achi...
متن کاملAn automated binary change detection model using a calibration approach
An automated binary change detection model using a threshold-based calibration approach was introduced in the study. The burdensome processes required in binary change detection, including calibration, calculation of accuracy, extraction of optimum threshold(s), generation of a binary change mask, and removal of “salt-and-pepper” noise were integrated and automated in the model. For practical p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Engineering & Technology
سال: 2018
ISSN: 2227-524X
DOI: 10.14419/ijet.v7i2.3.9956