Please use this identifier to cite or link to this item: https://hdl.handle.net/11147/4249
Title: Measurement of JavaScript applications' readiness to untrusted data using Bayesian Networks
Other Titles: JavaScrit uygulamalarında güvenilir olmayan verilere karşı hazırlığının Bayesian Ağları ile ölçülmesi
Authors: Tuğlular, Tuğkan
Ufuktepe, Ekincan
Keywords: Bayesian Networks
Input validation vulnerabilities
Measurement of readiness
Issue Date: Jul-2014
Publisher: Izmir Institute of Technology
Abstract: Web applications have become an integral part of our daily lives. People mostly provide their important needs, such as people keep their private data, do their banking transactions, shopping etc. through web applications. Therefore, web applications have been an attractive target to malicious individuals and organizations. The usage of JavaScript language by web application developers is increasing very fast, especially after JavaScript started to service back-end developers as well. Therefore, JavaScript has incorporated both front-end and back-end developers. Concurrently, due to flexibility and its most popular library called jQuery, JavaScript has become an attractive to web application developers. OWASP updates the top 25 security vulnerabilities regularly. According the results, SQL Injection (CWE-89) and Operating System Command Injection (CWE-78) has taken the 1st place and Cross-Site Scripting (XSS) (CWE-79) has taken the 3rd place. The results shows that three input validation based vulnerabilities appear in the top three; therefore, it can be said that input validation vulnerabilities have become critical vulnerabilities of web applications. However, developers still fail to validate the inputs or use libraries to protect their web applications against input validation vulnerabilities. In this thesis, JavaScript application’s functions are analyzed to determine if their parameters are validated or not. Then, according to the invalidated inputs, a Bayesian Network to measure its readiness to input validation vulnerabilities is generated.
Description: Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2014
Includes bibliographical references (leaves: 52-54)
Text in English; Abstract: Turkish and English
Full text release delayed at author's request until 2017.08.28
URI: http://hdl.handle.net/11147/4249
Appears in Collections:Master Degree / Yüksek Lisans Tezleri

Files in This Item:
File Description SizeFormat 
10029074.pdfMasterThesis2.36 MBAdobe PDFThumbnail
View/Open
Show full item record



CORE Recommender

Page view(s)

204
checked on Feb 19, 2024

Download(s)

74
checked on Feb 19, 2024

Google ScholarTM

Check





Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.