scispace - formally typeset
H

Hossain Shahriar

Researcher at Kennesaw State University

Publications -  228
Citations -  1848

Hossain Shahriar is an academic researcher from Kennesaw State University. The author has contributed to research in topics: Computer science & Web application. The author has an hindex of 19, co-authored 171 publications receiving 1339 citations. Previous affiliations of Hossain Shahriar include Queen's University.

Papers
More filters
Journal ArticleDOI

Mitigating program security vulnerabilities: Approaches and challenges

TL;DR: The work extensively compares and contrasts the existing program security vulnerability mitigation techniques, namely testing, static analysis, and hybrid analysis and discusses three other approaches employed to mitigate the most common program security vulnerabilities: secure programming, program transformation, and patching.
Proceedings ArticleDOI

MUSIC: Mutation-based SQL Injection Vulnerability Checking

TL;DR: This work proposes nine mutation operators that inject SQLIV in application source code that result in mutants, which can be killed only with test data containing SQL injection attacks, and implements a MUtation-based SQL Injection vulnerabilities Checking (testing) tool (MUSIC) that automatically generates mutants and performs mutation analysis.
Journal ArticleDOI

Trustworthiness testing of phishing websites: A behavior model-based approach

TL;DR: This work considers a suspected website as a web-based program and test the program based on a behavior model that captures the submission of forms with random inputs and the corresponding responses to decide whether a website is phishing or legitimate.
Proceedings ArticleDOI

MUTEC: Mutation-based testing of Cross Site Scripting

TL;DR: This work addresses XSSVs related to web-applications that use PHP and JavaScript code to generate dynamic HTML contents and proposes 11 mutation operators to force the generation of adequate test data set.
Proceedings ArticleDOI

Client-Side Detection of Cross-Site Request Forgery Attacks

TL;DR: The approach relies on the matching of parameters and values present in a suspected request with a form’s input fields and values that are being displayed on a webpage (visibility) and can detect most of the common form of reflected and stored CSRF attacks.