, Riotpix 20 Cette application est un forum de discussion en source libre où les internautes ont la possibilité de s'inscrire et poster des message

, CMS en anglais pour Content Management System) en source libre. Elle permet de créer un site Internet communautaire où les contenus sont créés et votés par les membres inscrits. Les nouveaux articles soumis par les utilisateurs sont ainsi notés par d'autres utilisateurs et 14

K. Stefan, E. Kirda, C. Kruegel, and N. Jovanovic, SecuBat: a web vulnerability scanner, Proc. of the 15th Intl. Conf. on World Wide Web (WWW '06), 2006.

W. G. Halfond, J. Viegas, and A. Orso, A Classification of SQL Injection Attacks and Countermeasures, Proc. of the International Symposium on Secure Software Engineering, 2006.

Y. Huang, S. Huang, T. Lin, and C. Tsai, Web Application security assessment by fault injection and behavioral monitoring, Proc. 12th Int. Conf. on World Wide Web (WWW'03), 2003.
DOI : 10.1145/775173.775174

. Ibm-x-force, , 2012.

J. Fonseca, M. Vieira, and H. Madeira, Testing and Comparing Web vulnerability scanning tools for SQL injections and XSS attacks, Proc. IEEE Symposium Pacific Rim Dependable Computing (PRDC'07), pp.330-337, 2007.
DOI : 10.1109/prdc.2007.55

J. Bau, E. Bursztein, D. Gupta, and J. Mitchell, State of the art: Automated black-box web application vulnerability testing, Proc. 2010 IEEE Symposium on Security and Privacy, 2010.
DOI : 10.1109/sp.2010.27

URL : http://www.stanford.edu/~jcm/papers/pci_oakland10.pdf

A. Doupé, M. Cova, and G. Vigna, Why Johnny can't pentest : An analysis of black-box web vulnerability scanners, Proc. DIMVA 2010. AnantaSec: Web Vulnerability Scanners Evaluation, 2009.

P. Dupont, Incremental regular inference, Proc. of the Fourth Intl. Colloquium on Grammatical Inference and Applications (ICGI '96), pp.222-237, 1996.
DOI : 10.1007/bfb0033357

V. Levenshtein, Binary codes capable of correcting deletions, insertions and reversals, pp.707-710, 1966.

J. W. Hunt and M. D. Mcilroy, An Algorithm for Differential File Comparison, 1976.

S. C. Johnson, Hierarchical Clustering Schemes, Psychometrika Journal, vol.2, pp.241-254, 1967.

A. Kiezun, P. J. Guo, K. Jayaraman, and M. D. Ernst, Automatic creation of SQL Injection and cross-site scripting attacks, Software Engineering, 2009. ICSE 2009. IEEE 31st International Conference on, 2009.

R. Akrout, Web Applications Vulnerability Analysis and Intrusion Detection Systems Assessment, 2012.