A Study on Web Application Vulnerabilities to find an optimal Security Architecture

04/14/2022
by   Dr. C. Amuthadevi, et al.
0

Over the past three decades, computers have managed to make their way into a majority of households. Due to this enormous transition, the surge in the internets popularity was inevitable. Just like everything else, whatever has a pro also has a con, both are faces of the same coin. Nowadays, web security has become one of the biggest challenges to the corporate world. All web applications are prone to security vulnerabilities, its the developers job to follow the latest norms in order to effectively reduce the threat posed by unauthorized users or programs. In this paper, we have tried to analyze the major problems faced in the real world and have tried to come up with effective solutions to combat all the aforementioned problems.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/17/2020

Understanding The Top 10 OWASP Vulnerabilities

Understanding the common vulnerabilities in web applications help busine...
research
03/05/2023

Minimize Web Applications vulnerabilities through the early Detection of CRLF Injection

Carriage return (CR) and line feed (LF), also known as CRLF injection is...
research
04/20/2023

A Survey of Prevent and Detect Access Control Vulnerabilities

Broken access control is one of the most common security vulnerabilities...
research
10/28/2014

A First Look at Firefox OS Security

With Firefox OS, Mozilla is making a serious push for an HTML5-based mob...
research
08/30/2023

Exposing and Addressing Security Vulnerabilities in Browser Text Input Fields

In this work, we perform a comprehensive analysis of the security of tex...
research
01/04/2020

Locality-Sensitive Hashing for Efficient Web Application Security Testing

Web application security has become a major concern in recent years, as ...
research
07/16/2022

Do Fewer Tiers Mean Fewer Tears? Eliminating Web Stack Components to Improve Interoperability

Web applications are structured as multi-tier stacks of components. Each...

Please sign up or login with your details

Forgot password? Click here to reset