Benchmarking Approach to Compare Web Applications Static Analysis Tools Detecting OWASP Top Ten Security Vulnerabilities
To detect security vulnerabilities in a web application, the security analyst must choose the best performance Security Analysis Static Tool (SAST) in terms of discovering the greatest number of security vulnerabilities as possible. To compare static analysis tools for web applications, an adapted b...
Gespeichert in:
Veröffentlicht in: | Computers, materials & continua materials & continua, 2020-01, Vol.64 (3), p.1555-1577 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1577 |
---|---|
container_issue | 3 |
container_start_page | 1555 |
container_title | Computers, materials & continua |
container_volume | 64 |
creator | R. Bermejo Higuera, Juan Bermejo Higuera, Javier A. Sicilia Montalvo, Juan Cubo Villalba, Javier Jos Nombela P閞ez, Juan |
description | To detect security vulnerabilities in a web application, the security analyst must choose the best performance Security Analysis Static Tool (SAST) in terms of discovering the greatest number of security vulnerabilities as possible. To compare static analysis tools for web applications, an adapted benchmark to the vulnerability categories included in the known standard Open Web Application Security Project (OWASP) Top Ten project is required. The information of the security effectiveness of a commercial static analysis tool is not usually a publicly accessible research and the state of the art on static security tool analyzers shows that the different design and implementation of those tools has different effectiveness rates in terms of security performance. Given the significant cost of commercial tools, this paper studies the performance of seven static tools using a new methodology proposal and a new benchmark designed for vulnerability categories included in the known standard OWASP Top Ten project. Thus, the practitioners will have more precise information to select the best tool using a benchmark adapted to the last versions of OWASP Top Ten project. The results of this work have been obtaining using widely acceptable metrics to classify them according to three different degree of web application criticality. |
doi_str_mv | 10.32604/cmc.2020.010885 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2419203446</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2419203446</sourcerecordid><originalsourceid>FETCH-LOGICAL-c313t-5c952bb4045d2122207dd5fb5cedf137d3ac43caf185d80bbab6fbe1dfa4ffee3</originalsourceid><addsrcrecordid>eNpNkE1LAzEYhIMoWKt3jwHPW_O53R5r_YRChVZ7DEk2sanbzZpkwf57U-vB0zsMw_DOA8A1RiNKSsRu9U6PCCJohDCqKn4CBpizsiCElKf_9Dm4iHGLEC3pBA3A951p9WYnw6drP-C064KXegOThzO_62QwcG3UwW-clsn5NsJlykLDaSubfXQRrrxvIrw3yeh0KFmsp8vX7HZwZVq4NLoPLu3he9-0JkjlGpeciZfgzMommqu_OwRvjw-r2XMxXzy9zKbzQlNMU8H1hBOlGGK8JjgPQOO65lZxbWqL6bimUjOqpcUVryuklFSlVQbXVjJrjaFDcHPszcu-ehOT2Po-5N-jIAxPCKKMlTmFjikdfIzBWNEFl6nsBUbil6_IfMWBrzjypT_60XCa</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2419203446</pqid></control><display><type>article</type><title>Benchmarking Approach to Compare Web Applications Static Analysis Tools Detecting OWASP Top Ten Security Vulnerabilities</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>R. Bermejo Higuera, Juan ; Bermejo Higuera, Javier ; A. Sicilia Montalvo, Juan ; Cubo Villalba, Javier ; Jos Nombela P閞ez, Juan</creator><creatorcontrib>R. Bermejo Higuera, Juan ; Bermejo Higuera, Javier ; A. Sicilia Montalvo, Juan ; Cubo Villalba, Javier ; Jos Nombela P閞ez, Juan</creatorcontrib><description>To detect security vulnerabilities in a web application, the security analyst must choose the best performance Security Analysis Static Tool (SAST) in terms of discovering the greatest number of security vulnerabilities as possible. To compare static analysis tools for web applications, an adapted benchmark to the vulnerability categories included in the known standard Open Web Application Security Project (OWASP) Top Ten project is required. The information of the security effectiveness of a commercial static analysis tool is not usually a publicly accessible research and the state of the art on static security tool analyzers shows that the different design and implementation of those tools has different effectiveness rates in terms of security performance. Given the significant cost of commercial tools, this paper studies the performance of seven static tools using a new methodology proposal and a new benchmark designed for vulnerability categories included in the known standard OWASP Top Ten project. Thus, the practitioners will have more precise information to select the best tool using a benchmark adapted to the last versions of OWASP Top Ten project. The results of this work have been obtaining using widely acceptable metrics to classify them according to three different degree of web application criticality.</description><identifier>ISSN: 1546-2226</identifier><identifier>ISSN: 1546-2218</identifier><identifier>EISSN: 1546-2226</identifier><identifier>DOI: 10.32604/cmc.2020.010885</identifier><language>eng</language><publisher>Henderson: Tech Science Press</publisher><subject>Analyzers ; Applications programs ; Benchmarks</subject><ispartof>Computers, materials & continua, 2020-01, Vol.64 (3), p.1555-1577</ispartof><rights>2020. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c313t-5c952bb4045d2122207dd5fb5cedf137d3ac43caf185d80bbab6fbe1dfa4ffee3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>R. Bermejo Higuera, Juan</creatorcontrib><creatorcontrib>Bermejo Higuera, Javier</creatorcontrib><creatorcontrib>A. Sicilia Montalvo, Juan</creatorcontrib><creatorcontrib>Cubo Villalba, Javier</creatorcontrib><creatorcontrib>Jos Nombela P閞ez, Juan</creatorcontrib><title>Benchmarking Approach to Compare Web Applications Static Analysis Tools Detecting OWASP Top Ten Security Vulnerabilities</title><title>Computers, materials & continua</title><description>To detect security vulnerabilities in a web application, the security analyst must choose the best performance Security Analysis Static Tool (SAST) in terms of discovering the greatest number of security vulnerabilities as possible. To compare static analysis tools for web applications, an adapted benchmark to the vulnerability categories included in the known standard Open Web Application Security Project (OWASP) Top Ten project is required. The information of the security effectiveness of a commercial static analysis tool is not usually a publicly accessible research and the state of the art on static security tool analyzers shows that the different design and implementation of those tools has different effectiveness rates in terms of security performance. Given the significant cost of commercial tools, this paper studies the performance of seven static tools using a new methodology proposal and a new benchmark designed for vulnerability categories included in the known standard OWASP Top Ten project. Thus, the practitioners will have more precise information to select the best tool using a benchmark adapted to the last versions of OWASP Top Ten project. The results of this work have been obtaining using widely acceptable metrics to classify them according to three different degree of web application criticality.</description><subject>Analyzers</subject><subject>Applications programs</subject><subject>Benchmarks</subject><issn>1546-2226</issn><issn>1546-2218</issn><issn>1546-2226</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNpNkE1LAzEYhIMoWKt3jwHPW_O53R5r_YRChVZ7DEk2sanbzZpkwf57U-vB0zsMw_DOA8A1RiNKSsRu9U6PCCJohDCqKn4CBpizsiCElKf_9Dm4iHGLEC3pBA3A951p9WYnw6drP-C064KXegOThzO_62QwcG3UwW-clsn5NsJlykLDaSubfXQRrrxvIrw3yeh0KFmsp8vX7HZwZVq4NLoPLu3he9-0JkjlGpeciZfgzMommqu_OwRvjw-r2XMxXzy9zKbzQlNMU8H1hBOlGGK8JjgPQOO65lZxbWqL6bimUjOqpcUVryuklFSlVQbXVjJrjaFDcHPszcu-ehOT2Po-5N-jIAxPCKKMlTmFjikdfIzBWNEFl6nsBUbil6_IfMWBrzjypT_60XCa</recordid><startdate>20200101</startdate><enddate>20200101</enddate><creator>R. Bermejo Higuera, Juan</creator><creator>Bermejo Higuera, Javier</creator><creator>A. Sicilia Montalvo, Juan</creator><creator>Cubo Villalba, Javier</creator><creator>Jos Nombela P閞ez, Juan</creator><general>Tech Science Press</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>20200101</creationdate><title>Benchmarking Approach to Compare Web Applications Static Analysis Tools Detecting OWASP Top Ten Security Vulnerabilities</title><author>R. Bermejo Higuera, Juan ; Bermejo Higuera, Javier ; A. Sicilia Montalvo, Juan ; Cubo Villalba, Javier ; Jos Nombela P閞ez, Juan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c313t-5c952bb4045d2122207dd5fb5cedf137d3ac43caf185d80bbab6fbe1dfa4ffee3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Analyzers</topic><topic>Applications programs</topic><topic>Benchmarks</topic><toplevel>online_resources</toplevel><creatorcontrib>R. Bermejo Higuera, Juan</creatorcontrib><creatorcontrib>Bermejo Higuera, Javier</creatorcontrib><creatorcontrib>A. Sicilia Montalvo, Juan</creatorcontrib><creatorcontrib>Cubo Villalba, Javier</creatorcontrib><creatorcontrib>Jos Nombela P閞ez, Juan</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Computers, materials & continua</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>R. Bermejo Higuera, Juan</au><au>Bermejo Higuera, Javier</au><au>A. Sicilia Montalvo, Juan</au><au>Cubo Villalba, Javier</au><au>Jos Nombela P閞ez, Juan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Benchmarking Approach to Compare Web Applications Static Analysis Tools Detecting OWASP Top Ten Security Vulnerabilities</atitle><jtitle>Computers, materials & continua</jtitle><date>2020-01-01</date><risdate>2020</risdate><volume>64</volume><issue>3</issue><spage>1555</spage><epage>1577</epage><pages>1555-1577</pages><issn>1546-2226</issn><issn>1546-2218</issn><eissn>1546-2226</eissn><abstract>To detect security vulnerabilities in a web application, the security analyst must choose the best performance Security Analysis Static Tool (SAST) in terms of discovering the greatest number of security vulnerabilities as possible. To compare static analysis tools for web applications, an adapted benchmark to the vulnerability categories included in the known standard Open Web Application Security Project (OWASP) Top Ten project is required. The information of the security effectiveness of a commercial static analysis tool is not usually a publicly accessible research and the state of the art on static security tool analyzers shows that the different design and implementation of those tools has different effectiveness rates in terms of security performance. Given the significant cost of commercial tools, this paper studies the performance of seven static tools using a new methodology proposal and a new benchmark designed for vulnerability categories included in the known standard OWASP Top Ten project. Thus, the practitioners will have more precise information to select the best tool using a benchmark adapted to the last versions of OWASP Top Ten project. The results of this work have been obtaining using widely acceptable metrics to classify them according to three different degree of web application criticality.</abstract><cop>Henderson</cop><pub>Tech Science Press</pub><doi>10.32604/cmc.2020.010885</doi><tpages>23</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1546-2226 |
ispartof | Computers, materials & continua, 2020-01, Vol.64 (3), p.1555-1577 |
issn | 1546-2226 1546-2218 1546-2226 |
language | eng |
recordid | cdi_proquest_journals_2419203446 |
source | EZB-FREE-00999 freely available EZB journals |
subjects | Analyzers Applications programs Benchmarks |
title | Benchmarking Approach to Compare Web Applications Static Analysis Tools Detecting OWASP Top Ten Security Vulnerabilities |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-23T18%3A22%3A03IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Benchmarking%20Approach%20to%20Compare%20Web%20Applications%20Static%20Analysis%20Tools%20Detecting%20OWASP%20Top%20Ten%20Security%20Vulnerabilities&rft.jtitle=Computers,%20materials%20&%20continua&rft.au=R.%20Bermejo%20Higuera,%20Juan&rft.date=2020-01-01&rft.volume=64&rft.issue=3&rft.spage=1555&rft.epage=1577&rft.pages=1555-1577&rft.issn=1546-2226&rft.eissn=1546-2226&rft_id=info:doi/10.32604/cmc.2020.010885&rft_dat=%3Cproquest_cross%3E2419203446%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2419203446&rft_id=info:pmid/&rfr_iscdi=true |