Automated server-side model for recognition of security vulnerabilities in scripting languages

1Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

With the increase of global accessibility of web applications, maintaining a reasonable security level for both user data and server resources has become an extremely challenging issue. Therefore, static code analysis systems can help web developers to reduce time and cost. In this paper, a new static analysis model is proposed. This model is designed to discover the security problems in scripting languages. The proposed model is implemented in a prototype SCAT, which is a static code analysis tool. SCAT applies the phases of the proposed model to catch security vulnerabilities in PHP 5.3. Empirical results attest that the proposed prototype is feasible and is able to contribute to the security of real-world web applications. SCAT managed to detect 94% of security vulnerabilities found in the testing benchmarks; this clearly indicates that the proposed model is able to provide an effective solution to complicated web systems by offering benefits of securing private data for users and maintaining web application stability for web applications providers

Cite

CITATION STYLE

APA

Abdel-Kader, R. F., Nashaat, M., Habib, M. I., & Mahdi, H. M. K. (2020). Automated server-side model for recognition of security vulnerabilities in scripting languages. International Journal of Electrical and Computer Engineering, 10(6), 6061–6070. https://doi.org/10.11591/ijece.v10i6.pp6061-6070

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free