using penetration testing tools. These tools test the security by performing an attack, without malicious payload (i.e. they will not delete parts of the web application or the database it uses), against the web application that should be tested. The results of these attacks are monitored by the tool to see which succeed. This dissertation proposes principled techniques to address input validation errors in web applications. Many analysis techniques have been applied to programs that run on single machines…
Words 5335 - Pages 22