Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities: Difference between revisions

Jump to navigation Jump to search
Line 46: Line 46:


== 3. Related Work ==
== 3. Related Work ==
Other researchers have empirically examined the vulnerability reports of open source applications to determine the best predictive models for vulnerability locations. Nehaus et al. [9] use their tool, Vulture, to predict vulnerable software components in versions of the Mozilla web browser.  They demonstrate that vulnerabilities correlate with component imports and that component imports in the Mozilla web browser can be used to consistently and accurately predict vulnerable components.  Specifically, Nehaus et al. found that certain imports are almost guaranteed to produce security problems with the importing component later in time.


== 4. Methodology ==
== 4. Methodology ==