An approach to website vulnerability detection based on static and dynamic analysis
This paper proposes an approach to automated website vulnerability detection based on the combination of static and dynamic analysis within a modular scanner architecture. The motivation for this study arises from the growing number of parameterized URLs in modern web applications and, as a conseque...
Saved in:
| Date: | 2026 |
|---|---|
| Main Authors: | Popereshnyak, S.V., Horokh, B.D. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
PROBLEMS IN PROGRAMMING
2026
|
| Subjects: | |
| Online Access: | https://pp.isofts.kiev.ua/index.php/ojs1/article/view/875 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Problems in programming |
| Download file: | |
Institution
Problems in programmingSimilar Items
Technology system integration of hardware and software data protection
by: Alishоv, N.I., et al.
Published: (2025)
by: Alishоv, N.I., et al.
Published: (2025)
The problems of massive construction of the integrated information security system (IISS) and a ways of their solution
by: Koltyk, M.A.
Published: (2025)
by: Koltyk, M.A.
Published: (2025)
System-ontological analysis the subject area of testing integrated information security system (IISS)
by: Koltyk, M.A.
Published: (2025)
by: Koltyk, M.A.
Published: (2025)
Methods and ways for realization of the automated support testing of the integrated information security system
by: Koltyk, M. A.
Published: (2025)
by: Koltyk, M. A.
Published: (2025)
Characteristics of information flows of software modules included in the software for automated support of ...
by: Borovskaya, E.N., et al.
Published: (2025)
by: Borovskaya, E.N., et al.
Published: (2025)
Reputation-based secyrity for heterogtneous structurally complex systems
by: Kussul, O.M.
Published: (2015)
by: Kussul, O.M.
Published: (2015)
Developing a conceptual framework for resilience in information systems
by: Korobeynikov, F.O.
Published: (2024)
by: Korobeynikov, F.O.
Published: (2024)
Algebraic patterns of binary code vulnerabilities
by: Yakovlev, V.M.
Published: (2020)
by: Yakovlev, V.M.
Published: (2020)
Simulation of the vulnerability of the steppe landscape and climate zone of Ukraine to climate changes based on space image data
by: Lybskyi, Mykola, et al.
Published: (2024)
by: Lybskyi, Mykola, et al.
Published: (2024)
Development service model of cockpit for flight simulator
by: Kolisnichenko, R.A.
Published: (2017)
by: Kolisnichenko, R.A.
Published: (2017)
Спрощене керування фізичною та хмарною інфраструктурою через централізований веб-інтерфейс
by: Byzov, Ivan, et al.
Published: (2025)
by: Byzov, Ivan, et al.
Published: (2025)
The Code is based on random numbers with irregular distribution
by: Mikhersky, R.M.
Published: (2025)
by: Mikhersky, R.M.
Published: (2025)
Digital twins in intrusion detection systems based on deep learning
by: Letychevskyi, O.O., et al.
Published: (2025)
by: Letychevskyi, O.O., et al.
Published: (2025)
Use of domain ontology for homonymy clarification into the natural language texts
by: Lesko, O.N., et al.
Published: (2018)
by: Lesko, O.N., et al.
Published: (2018)
Neurosymbolic models for ensuring cybersecurity in critical cyberphysical systems
by: Yevdokymov, S.O.
Published: (2025)
by: Yevdokymov, S.O.
Published: (2025)
Планування ресурсів у мережах IoT edge computing з використанням гібридного алгоритму глибокого навчання
by: Vijayasekaran, G., et al.
Published: (2022)
by: Vijayasekaran, G., et al.
Published: (2022)
Method of managing the execution of tasks of a multithreaded program according to a given dependency graph
by: Nesterenko, K.P., et al.
Published: (2024)
by: Nesterenko, K.P., et al.
Published: (2024)
Intonation expressiveness of the text at program sounding
by: Shevchenko, V.L., et al.
Published: (2021)
by: Shevchenko, V.L., et al.
Published: (2021)
Transforming governance: enabling scalable and adaptable decentralized networks on EVM-compatible blockchain
by: Katerynych, L.O., et al.
Published: (2024)
by: Katerynych, L.O., et al.
Published: (2024)
Semantic Indexing and Cluster Analysis of Cybersecurity Documents
by: Ланде, Д. В., et al.
Published: (2024)
by: Ланде, Д. В., et al.
Published: (2024)
Technological solutions for intelligent analysis of Big Data. Programming languages
by: Grishanova, I.Y., et al.
Published: (2019)
by: Grishanova, I.Y., et al.
Published: (2019)
Semantic approach to automated formation of information security systems documentation
by: Bova, Yu.V., et al.
Published: (2026)
by: Bova, Yu.V., et al.
Published: (2026)
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018)
by: Synitsyn, I.P., et al.
Published: (2018)
ІНЖЕНЕРНІ РІШЕННЯ ДЛЯ ІНТЕГРАЦІЇ ПРИСТРОЇВ І ДАТЧИКІВ В ІНТЕРНЕТІ РЕЧЕЙ
by: Керімзаді, Г.С., et al.
Published: (2025)
by: Керімзаді, Г.С., et al.
Published: (2025)
Ontological similar systems for analysis of texts of natural language
by: Kryvyi, S.L., et al.
Published: (2018)
by: Kryvyi, S.L., et al.
Published: (2018)
Parallel distributed system for social networks streaming data analysis
by: Doroshenko, А.Yu., et al.
Published: (2017)
by: Doroshenko, А.Yu., et al.
Published: (2017)
Organization of analytical activity based on scenario approach
by: Lande, D. V., et al.
Published: (2015)
by: Lande, D. V., et al.
Published: (2015)
Канонічні та матричні задання квазігруп четвертого порядку
by: Sokhatsky, F. M.; Інститут прикладних проблем механіки і математики ім. Я. С. Підстригача НАН України, Львів, et al.
Published: (2024)
by: Sokhatsky, F. M.; Інститут прикладних проблем механіки і математики ім. Я. С. Підстригача НАН України, Львів, et al.
Published: (2024)
Statistical Analysis Dataset Based on Taguchi Design and Regression Modeling
by: Kolesnyk, Vitalii, et al.
Published: (2026)
by: Kolesnyk, Vitalii, et al.
Published: (2026)
Identification of the native language of a person
by: Lazorenko, Yа.S., et al.
Published: (2023)
by: Lazorenko, Yа.S., et al.
Published: (2023)
ANALYSIS OF STABILITY OF NONLINEAR THERMAL PROCESSES IN ENVIRONMENTS WITH DIFFERENT SPATIAL STRUCTURES OF DISTURBANCE
by: Bondarenko, D., et al.
Published: (2023)
by: Bondarenko, D., et al.
Published: (2023)
Modernization of the economic and property complex management system of the National academy of sciences of Ukraine
by: Fedorenko, R.М., et al.
Published: (2025)
by: Fedorenko, R.М., et al.
Published: (2025)
WEB-system for the level of regional development evaluation
by: Pursky, O.I., et al.
Published: (2020)
by: Pursky, O.I., et al.
Published: (2020)
Segmentation of geospatial rasters: analysis of the temporal characteristics of the AREAONAREAOVERLAYER algorithm
by: Tsaryniuk, O.V., et al.
Published: (2025)
by: Tsaryniuk, O.V., et al.
Published: (2025)
Development and implementation of the management system of the economic and property complex of the National Academy of Sciences of Ukraine
by: Chadyuk, A.V., et al.
Published: (2023)
by: Chadyuk, A.V., et al.
Published: (2023)
Occurrence of metal iron inside the planets
by: Pecherskyi, D. M.
Published: (2016)
by: Pecherskyi, D. M.
Published: (2016)
INVESTIGATION OF WATER EQUILIBRIUM STATE AND PROBLEM OF DRINKING AND MINERAL WATER’S EFFECT ON HUMAN HEALTH
by: Shestopalov, V.M., et al.
Published: (2017)
by: Shestopalov, V.M., et al.
Published: (2017)
Domain engineering approach of software requirements analysis
by: Chebanyuk, O.V., et al.
Published: (2020)
by: Chebanyuk, O.V., et al.
Published: (2020)
Method of information and analytical support for information security risk management of information systems
by: Rodin, Y.S.
Published: (2019)
by: Rodin, Y.S.
Published: (2019)
Tasks for information security risks management in making-decision process
by: Rodin, Y.S.
Published: (2018)
by: Rodin, Y.S.
Published: (2018)
Similar Items
-
Technology system integration of hardware and software data protection
by: Alishоv, N.I., et al.
Published: (2025) -
The problems of massive construction of the integrated information security system (IISS) and a ways of their solution
by: Koltyk, M.A.
Published: (2025) -
System-ontological analysis the subject area of testing integrated information security system (IISS)
by: Koltyk, M.A.
Published: (2025) -
Methods and ways for realization of the automated support testing of the integrated information security system
by: Koltyk, M. A.
Published: (2025) -
Characteristics of information flows of software modules included in the software for automated support of ...
by: Borovskaya, E.N., et al.
Published: (2025)