[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/ICMeCG.2009.111guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

A Penetration Testing Method for E-Commerce Authentication System Security

Published: 16 September 2009 Publication History

Abstract

E-Commerce systems are suffering more and more security issues. Vulnerabilities of authentication systems are revealed when various attacks and malicious abuses are developed and deployed to violate security of system and information. To improve the ability to defend authentication system against invasion and abuse, a novel penetration testing method for E-Commerce authentication system is proposed to scrutinize the vulnerabilities of e-Commerce authentication system and evaluate severity level of potential vulnerabilities. The penetration testing method is an active vulnerability analysis and verification method that can mimic active attacks and perform exploitations by constructing effective and concise penetration testing cases. Through analyzing dynamic taint propagation, the presented method can determine feasibility of the attacks and evaluate security of authentication system. The experiment demonstrates the proposed method can serve as a viable and effective candidate for security detection of authentication system.
  1. A Penetration Testing Method for E-Commerce Authentication System Security

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      ICMECG '09: Proceedings of the 2009 International Conference on Management of e-Commerce and e-Government
      September 2009
      547 pages
      ISBN:9780769537788

      Publisher

      IEEE Computer Society

      United States

      Publication History

      Published: 16 September 2009

      Author Tags

      1. authentication system
      2. e-Commerce
      3. penetration testing
      4. program vulnerability

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 0
        Total Downloads
      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 19 Dec 2024

      Other Metrics

      Citations

      View Options

      View options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media