<?xml version="1.0"?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd"><responseDate>2026-05-24T11:13:55Z</responseDate><request verb="GetRecord" metadataPrefix="oai_dc">https://keep.lib.asu.edu/oai/request</request><GetRecord><record><header><identifier>oai:keep.lib.asu.edu:node-155601</identifier><datestamp>2024-12-20T18:25:12Z</datestamp><setSpec>oai_pmh:all</setSpec><setSpec>oai_pmh:repo_items</setSpec></header><metadata><oai_dc:dc xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd"><dc:identifier>155601</dc:identifier>
          <dc:identifier>https://hdl.handle.net/2286/R.I.44256</dc:identifier>
                  <dc:rights>http://rightsstatements.org/vocab/InC/1.0/</dc:rights>
          <dc:rights>All Rights Reserved</dc:rights>
                  <dc:date>2017</dc:date>
                  <dc:format>47 pages</dc:format>
                  <dc:type>Masters Thesis</dc:type>
          <dc:type>Academic theses</dc:type>
          <dc:type>Text</dc:type>
                  <dc:language>eng</dc:language>
                  <dc:contributor>Khairnar, Tejas</dc:contributor>
          <dc:contributor>Doupe, Adam</dc:contributor>
          <dc:contributor>Ahn, Gail-Joon</dc:contributor>
          <dc:contributor>Zhao, Ziming</dc:contributor>
          <dc:contributor>Arizona State University</dc:contributor>
                  <dc:description>Masters Thesis Computer Science 2017</dc:description>
          <dc:description>Web applications are an incredibly important aspect of our modern lives. Organizations&lt;br/&gt;&lt;br/&gt;and developers use automated vulnerability analysis tools, also known as&lt;br/&gt;&lt;br/&gt;scanners, to automatically find vulnerabilities in their web applications during development.&lt;br/&gt;&lt;br/&gt;Scanners have traditionally fallen into two types of approaches: black-box&lt;br/&gt;&lt;br/&gt;and white-box. In the black-box approaches, the scanner does not have access to the&lt;br/&gt;&lt;br/&gt;source code of the web application whereas a white-box approach has access to the&lt;br/&gt;&lt;br/&gt;source code. Today’s state-of-the-art black-box vulnerability scanners employ various&lt;br/&gt;&lt;br/&gt;methods to fuzz and detect vulnerabilities in a web application. However, these&lt;br/&gt;&lt;br/&gt;scanners attempt to fuzz the web application with a number of known payloads and&lt;br/&gt;&lt;br/&gt;to try to trigger a vulnerability. This technique is simple but does not understand&lt;br/&gt;&lt;br/&gt;the web application that it is testing. This thesis, presents a new approach to vulnerability&lt;br/&gt;&lt;br/&gt;analysis. The vulnerability analysis module presented uses a novel approach&lt;br/&gt;&lt;br/&gt;of Inductive Reverse Engineering (IRE) to understand and model the web application.&lt;br/&gt;&lt;br/&gt;IRE first attempts to understand the behavior of the web application by giving&lt;br/&gt;&lt;br/&gt;certain number of input/output pairs to the web application. Then, the IRE module&lt;br/&gt;&lt;br/&gt;hypothesizes a set of programs (in a limited language specific to web applications,&lt;br/&gt;&lt;br/&gt;called AWL) that satisfy the input/output pairs. These hypotheses takes the form of&lt;br/&gt;&lt;br/&gt;a directed acyclic graph (DAG). AWL vulnerability analysis module can then attempt&lt;br/&gt;&lt;br/&gt;to detect vulnerabilities in this DAG. Further, it generates the payload based on the&lt;br/&gt;&lt;br/&gt;DAG, and therefore this payload will be a precise payload to trigger the potential vulnerability&lt;br/&gt;&lt;br/&gt;(based on our understanding of the program). It then tests this potential&lt;br/&gt;&lt;br/&gt;vulnerability using the generated payload on the actual web application, and creates&lt;br/&gt;&lt;br/&gt;a verification procedure to see if the potential vulnerability is actually vulnerable,&lt;br/&gt;&lt;br/&gt;based on the web application’s response.</dc:description>
                  <dc:subject>Computer Science</dc:subject>
          <dc:subject>Black-Box</dc:subject>
          <dc:subject>Cross Site Scripting</dc:subject>
          <dc:subject>Inductive Reverse Engineering</dc:subject>
          <dc:subject>Static Program Analysis</dc:subject>
          <dc:subject>Vulnerability Scanner</dc:subject>
          <dc:subject>XSS</dc:subject>
                  <dc:title>Next Generation Black-Box Web Application Vulnerability Analysis Framework</dc:title></oai_dc:dc></metadata></record></GetRecord></OAI-PMH>
