Skip to main navigation Skip to search Skip to main content

Bypass testing of web applications

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

80 Scopus citations

Abstract

Web software applications are increasingly being deployed in sensitive situations. Web applications are used to transmit, accept and store data that is personal, company confidential and sensitive. Input validation testing (IVT) checks user inputs to ensure that they conform to the program's requirements, which is particularly important for software that relies on user inputs, including Web applications. A common technique in Web applications is to perform input validation on the client with scripting languages such as JavaScript. An insidious problem with client-side input validation is that end users can bypass this validation. Bypassing validation can cause failures in the software, and can also break the security on Web applications, leading to unauthorized access to data, system failures, invalid purchases and entry of bogus data. We are developing a strategy called bypass testing to create client-side tests for Web applications that intentionally violate explicit and implicit checks on user inputs. This paper describes the strategy, defines specific rules and adequacy criteria for tests, describes a proof-of-concept automated tool, and presents initial empirical results from applying bypass testing.

Original languageEnglish
Title of host publicationISSRE 2004 Proceedings; 15th International Symposium on Software Reliability Engineering
Pages187-197
Number of pages11
DOIs
StatePublished - 2004
EventISSRE 2004 Proceedings; 15th International Symposium on Software Reliability Engineering - Saint-Malo, France
Duration: Nov 2 2004Nov 5 2004

Publication series

NameProceedings - International Symposium on Software Reliability Engineering, ISSRE

Conference

ConferenceISSRE 2004 Proceedings; 15th International Symposium on Software Reliability Engineering
Country/TerritoryFrance
CitySaint-Malo
Period11/2/0411/5/04

Fingerprint

Dive into the research topics of 'Bypass testing of web applications'. Together they form a unique fingerprint.

Cite this