H
Hossain Shahriar
Researcher at Kennesaw State University
Publications - 228
Citations - 1848
Hossain Shahriar is an academic researcher from Kennesaw State University. The author has contributed to research in topics: Computer science & Web application. The author has an hindex of 19, co-authored 171 publications receiving 1339 citations. Previous affiliations of Hossain Shahriar include Queen's University.
Papers
More filters
Journal ArticleDOI
Mitigating program security vulnerabilities: Approaches and challenges
TL;DR: The work extensively compares and contrasts the existing program security vulnerability mitigation techniques, namely testing, static analysis, and hybrid analysis and discusses three other approaches employed to mitigate the most common program security vulnerabilities: secure programming, program transformation, and patching.
Proceedings ArticleDOI
MUSIC: Mutation-based SQL Injection Vulnerability Checking
TL;DR: This work proposes nine mutation operators that inject SQLIV in application source code that result in mutants, which can be killed only with test data containing SQL injection attacks, and implements a MUtation-based SQL Injection vulnerabilities Checking (testing) tool (MUSIC) that automatically generates mutants and performs mutation analysis.
Journal ArticleDOI
Trustworthiness testing of phishing websites: A behavior model-based approach
TL;DR: This work considers a suspected website as a web-based program and test the program based on a behavior model that captures the submission of forms with random inputs and the corresponding responses to decide whether a website is phishing or legitimate.
Proceedings ArticleDOI
MUTEC: Mutation-based testing of Cross Site Scripting
TL;DR: This work addresses XSSVs related to web-applications that use PHP and JavaScript code to generate dynamic HTML contents and proposes 11 mutation operators to force the generation of adequate test data set.
Proceedings ArticleDOI
Client-Side Detection of Cross-Site Request Forgery Attacks
TL;DR: The approach relies on the matching of parameters and values present in a suspected request with a form’s input fields and values that are being displayed on a webpage (visibility) and can detect most of the common form of reflected and stored CSRF attacks.