Repository logo
 
Publication

Protecting Web applications with secure code by identifying and removing vulnerabilities using similarity techniques

datacite.subject.fosEngenharia e Tecnologia::Engenharia Eletrotécnica, Eletrónica e Informáticapt_PT
dc.contributor.advisorMedeiros, Ibéria Vitória de Sousa
dc.contributor.advisorCogo, Vinicius Vielmo
dc.contributor.authorPrates, David António Cota
dc.date.accessioned2025-07-16T13:25:21Z
dc.date.available2025-07-16T13:25:21Z
dc.date.issued2025
dc.date.submitted2025
dc.descriptionTese de Mestrado, Segurança Informática, 2025, Universidade de Lisboa, Faculdade de Ciênciaspt_PT
dc.description.abstractWeb applications are frequently targeted due to vulnerabilities in their source code, particularly weaknesses such as Cross-Site Scripting (XSS) and SQL injection (SQLi). When exploited, these vulnerabilities can compromise the confidentiality, integrity, and availability of data, potentially putting users at risk. Given the constant discovery of new security flaws, continuous monitoring is essential. However, remediation teams face significant challenges, as detecting and fixing vulnerabilities is a time-consuming process that can take months, leaving systems exposed to malicious exploitation. Although automated tools exist to detect vulnerabilities, they often provide limited guidance on remediation, offering only vague or insufficient recommendations. As a result, the teams spend additional time identifying appropriate fixes, further delaying the remediation process. To address this issue, this research proposes the development of a tool designed to minimize human intervention in the remediation of vulnerabilities. Specifically, the tool aims to automatically identify and correct security flaws in PHP code. Unlike existing solutions, this project will use Locality Sensitive Hashing (LSH) to detect vulnerabilities based on similarity patterns. This approach enables the identification of both known and structurally similar vulnerabilities, mitigating the risks associated with code modifications, a common tactic used by attackers to evade traditional signature-based detection. Furthermore, the tool is designed to maintain a low false positive rate and to be easily adaptable to the needs of remediation teams. Its modular design allows for future enhancements, ensuring scalability and continuous improvement in vulnerability detection and mitigation. The evaluation performed, which included the comparison to other existing tools, has returned good and promising results.pt_PT
dc.identifier.urihttp://hdl.handle.net/10400.5/102176
dc.language.isoengpt_PT
dc.subjectCorreção automática de códigopt_PT
dc.subjectTécnicas de similaridadept_PT
dc.subjectVulnerabilidades Webpt_PT
dc.subjectCorreção de códigopt_PT
dc.subjectDeteção de códigopt_PT
dc.subjectTeses de mestrado - 2025pt_PT
dc.titleProtecting Web applications with secure code by identifying and removing vulnerabilities using similarity techniquespt_PT
dc.typemaster thesis
dspace.entity.typePublication
rcaap.rightsopenAccesspt_PT
rcaap.typemasterThesispt_PT
thesis.degree.nameMestrado em Segurança Informáticapt_PT

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
TM_David_Prates.pdf
Size:
1.51 MB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.2 KB
Format:
Item-specific license agreed upon to submission
Description: