Author | Year of publications | Methodology for evaluating security | Mechanism for assessing security vulnerability | Phases |
P. Salini1 et al. | 2012 | Model-Oriented Security Requirement Engineering (MOSRE) | E-voting(Run time) | Requirement |
Anshika Pandey et al. | 2014 | H2S Application framework | Run time | Implementation |
Mattia Monga et al. | 2008 | Phan (PHP Hybrid Analyzer) | Run time | Testing |
Romaric Ludinard et al. | 2012 | RRABIDS (Ruby on Rails Anomaly Based Intrusion Detection System) | Code analysis | Requirement |
Theodoor Scholte et al. | 2013 | IPAAS (Input Parameter Analysis System) | Code analysis | Testing |
Lwin Khin Shar et al. | 2012 | Safer XSS | Run time | Testing |
Li et al. | 2010 | Perturbation based Interactive UIV Testing (PIUIVT) | Code analysis | Implementation |
Mei Junjin | 2009 | SQL Injection Gen | Run time checks | Testing |
Davide Balzarotti et al. | 2008 | Saner | Run time | Implementation |
Abdelkader Lahmadiet al. | 2012 | Sec SIP framework | Code analysis | Testing |
Michael D. Bond et al. | 2010 | PECAN (Precise, Efficient, Context-sensitive Anomaly detection) | Code analysis | Implementation |
Viktoria Felmetsger et al. | 2010 | Waler’s architecture. | Run time | Testing |
Santa Barbara | 2007 | MiMoSA | Code analysis | Implementation |
Yao-Wen Huang et al. | 2004 | Web SSARI (Web Application Security by Static Analysis and Runtime Inspection) | Code analysis | Testing |
Ibéria Medeiros et al. | 2013 | Web Application Protection (WAP) tool | Taint analysis | Testing |
Yao-Wen Huang et al. | 2003 | Web Application Vulnerability and Error Scanner (WAVES) | Code analysis | Testing |
Trevor Jim et al. | 2007 | Browser-Enforced Embedded Policies (BEEP) | Run time | Implementation |
Prithvi Bisht | 2010 | NOTAMPER tool | Code analysis | Testing |