Author

Year of publications

Methodology for evaluating security

Mechanism for assessing security vulnerability

Phases

P. Salini1 et al.

2012

Model-Oriented Security Requirement Engineering (MOSRE)

E-voting(Run time)

Requirement

Anshika Pandey et al.

2014

H2S Application framework

Run time

Implementation

Mattia Monga et al.

2008

Phan (PHP Hybrid Analyzer)

Run time

Testing

Romaric Ludinard et al.

2012

RRABIDS (Ruby on Rails Anomaly Based Intrusion Detection System)

Code analysis

Requirement

Theodoor Scholte et al.

2013

IPAAS (Input Parameter Analysis System)

Code analysis

Testing

Lwin Khin Shar et al.

2012

Safer XSS

Run time

Testing

Li et al.

2010

Perturbation based Interactive UIV Testing (PIUIVT)

Code analysis

Implementation

Mei Junjin

2009

SQL Injection Gen

Run time checks

Testing

Davide Balzarotti et al.

2008

Saner

Run time

Implementation

Abdelkader Lahmadiet al.

2012

Sec SIP framework

Code analysis

Testing

Michael D. Bond et al.

2010

PECAN (Precise, Efficient, Context-sensitive Anomaly detection)

Code analysis

Implementation

Viktoria Felmetsger et al.

2010

Waler’s architecture.

Run time

Testing

Santa Barbara

2007

MiMoSA

Code analysis

Implementation

Yao-Wen Huang et al.

2004

Web SSARI (Web Application Security by Static Analysis and Runtime Inspection)

Code analysis

Testing

Ibéria Medeiros et al.

2013

Web Application Protection (WAP) tool

Taint analysis

Testing

Yao-Wen Huang et al.

2003

Web Application Vulnerability and Error Scanner (WAVES)

Code analysis

Testing

Trevor Jim et al.

2007

Browser-Enforced Embedded Policies (BEEP)

Run time

Implementation

Prithvi Bisht

2010

NOTAMPER tool

Code analysis

Testing