02125oam 2200409zu 450 991087316280332120241212220146.0(CKB)2670000000131750(SSID)ssj0000669591(PQKBManifestationID)12235995(PQKBTitleCode)TC0000669591(PQKBWorkID)10726896(PQKB)10772962(NjHacI)992670000000131750(EXLCZ)99267000000013175020160829d2011 uy engur|||||||||||txtccr2011 11th IEEE International Working Conference on Source Code Analysis and Manipulation[Place of publication not identified]IEEE20111 online resourceBibliographic Level Mode of Issuance: Monograph9781457709326 1457709325 More and more web applications suffer the presence of cross-site scripting vulnerabilities that could be exploited by attackers to access sensitive information (such as credentials or credit card numbers). Hence proper tests are required to assess the security of web applications. In this paper, we resort to a search based approach for security testing web applications. We take advantage of static analysis to detect candidate cross-site scripting vulnerabilities. Input values that expose these vulnerabilities are searched by a genetic algorithm and, to help the genetic algorithm escape local optima, symbolic constraints are collected at run-time and passed to a solver. Search results represent test cases to be used by software developers to understand and fix security problems. We implemented this approach in a prototype and evaluated it on real world PHP code.Source code (Computer science)Source code (Computer science)005.1IEEE StaffPQKBPROCEEDING99108731628033212011 11th IEEE International Working Conference on Source Code Analysis and Manipulation2518321UNINA