(Downloads - 0)
For more info about our services contact : help@bestpfe.com
Table of contents
1 Introduction
1.1 Problem
1.2 Aim
1.3 Contribution
1.4 Limitations
1.5 Methodology
1.6 Ethics & Sustainability
1.7 Outline
2 Background
2.1 Web Application
2.1.1 Structured Query Language
2.2 CIA Triad
2.3 Security Vulnerabilities
2.3.1 SQL Injection Attacks
2.3.2 Cross-Site Scripting
2.4 Taint Tracking
2.5 Java
2.5.1 Java Virtual Machine
2.5.2 Instrumentation
2.5.3 Javassist
3 Related Work
4 Implementation
4.1 Policies
4.1.1 Integrity
4.1.2 Confidentiality
4.1.3 WebTaint
4.2 Sources, Sinks & Sanitizers
4.3 WebTaint
4.3.1 The Utils Project
4.3.2 Limitations
5 Evaluation
5.1 Test Environment
5.2 Benchmarking
5.2.1 Web Applications
5.2.2 Micro Benchmarks
6 Result
6.1 Web Applications
6.2 Introduced Overhead
6.2.1 Time
6.2.2 Memory
7 Discussion
7.1 Taint Propagation
7.2 Sources, Sinks & Sanitizers
7.3 Methodology of Evaluation
8 Future Work
9 Conclusion
Bibliography
A Raw Data



