Subtopic Deep Dive

Dynamic Security Testing of Web Applications
Research Guide

What is Dynamic Security Testing of Web Applications?

Dynamic Security Testing of Web Applications applies runtime analysis techniques including fuzzing, taint tracking, and fault injection to detect vulnerabilities in executing web applications.

This subtopic focuses on DAST methods that scan deployed applications for issues like SQL injection and XSS missed by static analysis. Key techniques include dynamic taint analysis (Newsome and Song, 2005, 1294 citations) and fault injection (Huang et al., 2003, 319 citations). Over 10 papers from 2003-2014 establish foundational approaches with 300-1294 citations each.

15
Curated Papers
3
Key Challenges

Why It Matters

Dynamic testing reveals runtime vulnerabilities in deployed web apps, preventing exploits like SQL injection that static methods overlook (Halfond and Orso, 2005, AMNESIA, 521 citations). Fault injection simulates attacks to validate sanitization, improving real-world security for e-commerce and banking apps (Balzarotti et al., 2008, Saner, 380 citations; Huang et al., 2003, 319 citations). Automated exploit generation reduces manual pentesting costs, enabling continuous security in CI/CD pipelines (Kieyzun et al., 2009, 340 citations).

Key Research Challenges

Runtime Coverage Gaps

Dynamic tests struggle to reach deep code paths in complex web apps due to authentication barriers and stateful interactions. Newsome and Song (2005) highlight taint analysis limitations against evasive exploits. Achieving high coverage requires advanced fuzzing beyond basic inputs.

False Positive Reduction

DAST tools generate many alerts from benign inputs mimicking attacks, overwhelming analysts. Balzarotti et al. (2008) combine static-dynamic analysis to validate sanitization and cut false positives. Distinguishing real exploits from noise remains unsolved at scale.

JavaScript Obfuscation Handling

Client-side JS dynamic behavior evades server-focused DAST, with minification complicating analysis. Richards et al. (2010) analyze JS runtime patterns but note testing gaps (354 citations). Selective record-replay like Jalangi (Sen et al., 2013, 269 citations) addresses but scales poorly.

Essential Papers

1.

Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software

James Newsome, Dawn Song · 2005 · OPAL (Open@LaTrobe) (La Trobe University) · 1.3K citations

Software vulnerabilities have had a devastating effect on the Internet. Worms such as CodeRed and Slammer can compromise hundreds of thousands of hosts within hours or even minutes, and cause milli...

2.

AMNESIA

William G. J. Halfond, Alessandro Orso · 2005 · 521 citations

The use of web applications has become increasingly popular in our routine activities, such as reading the news, paying bills, and shopping on-line. As the availability of these services grows, we ...

3.

Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications

Davide Balzarotti, Marco Cova, Viktoria Felmetsger et al. · 2008 · Proceedings - IEEE Symposium on Security and Privacy/Proceedings of the ... IEEE Symposium on Security and Privacy · 380 citations

Web applications are ubiquitous, perform mission- critical tasks, and handle sensitive user data. Unfortunately, web applications are often implemented by developers with limited security skills, a...

4.

Static detection of security vulnerabilities in scripting languages

Yichen Xie, Alex Aiken · 2006 · 368 citations

We present a static analysis algorithm for detecting security vulnerabilities in PHP, a popular server-side scripting language for building web applications. Our analysis employs a novel three-tier...

5.

An analysis of the dynamic behavior of JavaScript programs

Gregor Richards, Sylvain Lebresne, Brian R. Burg et al. · 2010 · 354 citations

The JavaScript programming language is widely used for web programming and, increasingly, for general purpose computing. As such, improving the correctness, security and performance of JavaScript a...

6.

Sound and precise analysis of web applications for injection vulnerabilities

Gary Wassermann, Zhendong Su · 2007 · 348 citations

Web applications are popular targets of security attacks. One common type of such attacks is SQL injection, where an attacker exploits faulty application code to execute maliciously crafted databas...

7.

Automatic creation of SQL Injection and cross-site scripting attacks

Adam Kieyzun, Philip J. Guo, Karthick Jayaraman et al. · 2009 · 340 citations

We present a technique for finding security vulnerabilitiesin Web applications. SQL Injection (SQLI) and cross-sitescripting (XSS) attacks are widespread forms of attackin which the attacker crafts...

Reading Guide

Foundational Papers

Start with Newsome and Song (2005, 1294 citations) for taint analysis fundamentals; Halfond and Orso (2005, AMNESIA, 521 citations) for web-specific SQLi detection; Balzarotti et al. (2008, Saner, 380 citations) for hybrid static-dynamic validation.

Recent Advances

Sen et al. (2013, Jalangi, 269 citations) for JS dynamic analysis; Brubaker et al. (2014, 204 citations) for adversarial SSL testing; Kieyzun et al. (2009, 340 citations) for automated exploit generation.

Core Methods

Dynamic taint tracking (Newsome 2005); runtime string analysis (Halfond 2005); fault injection and monitoring (Huang 2003); selective record-replay (Sen 2013); hybrid sanitization validation (Balzarotti 2008).

How PapersFlow Helps You Research Dynamic Security Testing of Web Applications

Discover & Search

Research Agent uses citationGraph on Newsome and Song (2005) to map 1294-citing works in taint analysis, then findSimilarPapers for DAST extensions. exaSearch queries 'dynamic fuzzing web vulnerabilities' to uncover Huang et al. (2003) fault injection lineage. searchPapers with 'DAST SQL injection runtime' surfaces Halfond and Orso (2005) AMNESIA.

Analyze & Verify

Analysis Agent runs readPaperContent on Balzarotti et al. (2008) Saner to extract hybrid static-dynamic algorithms, then verifyResponse with CoVe against claims of 380-citation impact. runPythonAnalysis parses citation networks from exported CSV for vulnerability trend stats. GRADE grading scores AMNESIA (Halfond and Orso, 2005) methodology for SQLi detection precision.

Synthesize & Write

Synthesis Agent detects gaps in JS DAST coverage from Richards et al. (2010), flagging contradictions with Sen et al. (2013) Jalangi. Writing Agent uses latexEditText to draft comparisons, latexSyncCitations for 10-paper bibliography, and latexCompile for vulnerability taxonomy report. exportMermaid visualizes taint flow from Newsome and Song (2005).

Use Cases

"Compare false positive rates in DAST tools from 2005-2014 papers"

Research Agent → searchPapers + citationGraph → Analysis Agent → runPythonAnalysis (pandas on citation/impact data) → statistical table of FP rates across Saner, AMNESIA, and fault injection papers.

"Write LaTeX survey on dynamic taint analysis for web security"

Research Agent → exaSearch 'taint tracking web vulns' → Synthesis → gap detection → Writing Agent → latexEditText + latexSyncCitations (Newsome 2005 et al.) + latexCompile → formatted PDF with DAST taxonomy.

"Find GitHub repos implementing web app fault injection from papers"

Research Agent → citationGraph (Huang 2003) → Code Discovery → paperExtractUrls → paperFindGithubRepo → githubRepoInspect → list of 5 repos with DAST fuzzers and runtime monitors.

Automated Workflows

DeepScan applies 7-step analysis to Halfond AMNESIA (2005): searchPapers → readPaperContent → runPythonAnalysis on SQLi payloads → CoVe verification → GRADE methodology → synthesis gaps → LaTeX report. Deep Research conducts systematic review of 50+ DAST papers via citationGraph from Newsome (2005), yielding structured vulnerability trends report. Theorizer generates hypotheses on hybrid DAST from Saner (Balzarotti 2008) patterns.

Frequently Asked Questions

What defines dynamic security testing of web applications?

Runtime techniques like fuzzing, taint tracking, and fault injection scan executing web apps for vulnerabilities missed by static analysis (Newsome and Song, 2005).

What are core methods in this subtopic?

AMNESIA detects SQL injection via dynamic string analysis (Halfond and Orso, 2005); Saner validates sanitization by composing static-dynamic checks (Balzarotti et al., 2008); fault injection simulates attacks (Huang et al., 2003).

What are key papers?

Newsome and Song (2005, 1294 citations) on taint analysis; Halfond and Orso (2005, 521 citations) AMNESIA for SQLi; Balzarotti et al. (2008, 380 citations) Saner for sanitization.

What open problems exist?

Scaling coverage-guided fuzzing to stateful apps; reducing false positives in JS environments (Richards et al., 2010); integrating client-server dynamic analysis (Sen et al., 2013).

Research Web Application Security Vulnerabilities with AI

PapersFlow provides specialized AI tools for Computer Science researchers. Here are the most relevant for this topic:

See how researchers in Computer Science & AI use PapersFlow

Field-specific workflows, example queries, and use cases.

Computer Science & AI Guide

Start Researching Dynamic Security Testing of Web Applications with AI

Search 474M+ papers, run AI-powered literature reviews, and write with integrated citations — all in one workspace.

See how PapersFlow works for Computer Science researchers