Published December 1, 2020 | Version v1
Journal article Open

Automated server-side model for recognition of security vulnerabilities in scripting languages

  • 1. Department of Electrical Engineering, Faculty of Engineering, Port Said University, Egypt
  • 2. Faculty of Engineering, Ain Shams University, Egypt

Description

With the increase of global accessibility of web applications, maintaining a reasonable security level for both user data and server resources has become an extremely challenging issue. Therefore, static code analysis systems can help web developers to reduce time and cost. In this paper, a new static analysis model is proposed. This model is designed to discover the security problems in scripting languages. The proposed model is implemented in a prototype SCAT, which is a static code analysis tool. SCAT applies the phases of the proposed model to catch security vulnerabilities in PHP 5.3. Empirical results attest that the proposed prototype is feasible and is able to contribute to the security of real-world web applications. SCAT managed to detect 94% of security vulnerabilities found in the testing benchmarks; this clearly indicates that the proposed model is able to provide an effective solution to complicated web systems by offering benefits of securing private data for users and maintaining web application stability for web applications providers.

Files

57 21639 27may 17may 8dec19 L.pdf

Files (706.4 kB)

Name Size Download all
md5:fcc5edfcd18bb38c279e7d7579401773
706.4 kB Preview Download