Black-box web application vulnerability scanners are automated
tools that probe web applications for security vulnerabilities,
without access to source code used to build the
applications. While there are intrinsic limitations of blackbox
tools, in comparison with code walkthrough, automated
source code analysis tools, and procedures carried out by
red teams, automated black-box tools also have advantages.
Black-box scanners mimic external attacks from hackers,
provide cost-effective methods for detecting a range of important
vulnerabilities, and may configure and test defenses
such as web application firewalls. Since the usefulness of
black-box web scanners is directly related to their ability
to detect vulnerabilities of interest to web developers, we
undertook a study to determine the effectiveness of leading
tools. Our goal in this paper is to report test results and
identify the strengths of current tools, their limitations, and
strategic directions for future research on web application
scanning methods. Because this is an anonymized conference
submission, we note that the authors of this study are
university researchers.
Black-box web application vulnerability scanners are automatedtools that probe web applications for security vulnerabilities,without access to source code used to build theapplications. While there are intrinsic limitations of blackboxtools, in comparison with code walkthrough, automatedsource code analysis tools, and procedures carried out byred teams, automated black-box tools also have advantages.Black-box scanners mimic external attacks from hackers,provide cost-effective methods for detecting a range of importantvulnerabilities, and may configure and test defensessuch as web application firewalls. Since the usefulness ofblack-box web scanners is directly related to their abilityto detect vulnerabilities of interest to web developers, weundertook a study to determine the effectiveness of leadingtools. Our goal in this paper is to report test results andidentify the strengths of current tools, their limitations, andstrategic directions for future research on web applicationscanning methods. Because this is an anonymized conferencesubmission, we note that the authors of this study areuniversity researchers.
การแปล กรุณารอสักครู่..
