Logo do repositório
 
Publicação

Protecting Web applications with secure code by identifying and removing vulnerabilities using similarity techniques

datacite.subject.fosEngenharia e Tecnologia::Engenharia Eletrotécnica, Eletrónica e Informáticapt_PT
dc.contributor.advisorMedeiros, Ibéria Vitória de Sousa
dc.contributor.advisorCogo, Vinicius Vielmo
dc.contributor.authorPrates, David António Cota
dc.date.accessioned2025-07-16T13:25:21Z
dc.date.available2025-07-16T13:25:21Z
dc.date.issued2025
dc.date.submitted2025
dc.descriptionTese de Mestrado, Segurança Informática, 2025, Universidade de Lisboa, Faculdade de Ciênciaspt_PT
dc.description.abstractWeb applications are frequently targeted due to vulnerabilities in their source code, particularly weaknesses such as Cross-Site Scripting (XSS) and SQL injection (SQLi). When exploited, these vulnerabilities can compromise the confidentiality, integrity, and availability of data, potentially putting users at risk. Given the constant discovery of new security flaws, continuous monitoring is essential. However, remediation teams face significant challenges, as detecting and fixing vulnerabilities is a time-consuming process that can take months, leaving systems exposed to malicious exploitation. Although automated tools exist to detect vulnerabilities, they often provide limited guidance on remediation, offering only vague or insufficient recommendations. As a result, the teams spend additional time identifying appropriate fixes, further delaying the remediation process. To address this issue, this research proposes the development of a tool designed to minimize human intervention in the remediation of vulnerabilities. Specifically, the tool aims to automatically identify and correct security flaws in PHP code. Unlike existing solutions, this project will use Locality Sensitive Hashing (LSH) to detect vulnerabilities based on similarity patterns. This approach enables the identification of both known and structurally similar vulnerabilities, mitigating the risks associated with code modifications, a common tactic used by attackers to evade traditional signature-based detection. Furthermore, the tool is designed to maintain a low false positive rate and to be easily adaptable to the needs of remediation teams. Its modular design allows for future enhancements, ensuring scalability and continuous improvement in vulnerability detection and mitigation. The evaluation performed, which included the comparison to other existing tools, has returned good and promising results.pt_PT
dc.identifier.urihttp://hdl.handle.net/10400.5/102176
dc.language.isoengpt_PT
dc.subjectCorreção automática de códigopt_PT
dc.subjectTécnicas de similaridadept_PT
dc.subjectVulnerabilidades Webpt_PT
dc.subjectCorreção de códigopt_PT
dc.subjectDeteção de códigopt_PT
dc.subjectTeses de mestrado - 2025pt_PT
dc.titleProtecting Web applications with secure code by identifying and removing vulnerabilities using similarity techniquespt_PT
dc.typemaster thesis
dspace.entity.typePublication
rcaap.rightsopenAccesspt_PT
rcaap.typemasterThesispt_PT
thesis.degree.nameMestrado em Segurança Informáticapt_PT

Ficheiros

Principais
A mostrar 1 - 1 de 1
A carregar...
Miniatura
Nome:
TM_David_Prates.pdf
Tamanho:
1.51 MB
Formato:
Adobe Portable Document Format
Licença
A mostrar 1 - 1 de 1
Miniatura indisponível
Nome:
license.txt
Tamanho:
1.2 KB
Formato:
Item-specific license agreed upon to submission
Descrição: