Automated testing of complex Web 2.0 applications prevents security vulnerabilities

Mar 01, 2013
Automated testing of complex Web 2.0 applications prevents security vulnerabilities
Computer scientists from Saarland University have developed a software system for checking complex web applications autonomously. Credit: bellhäuser - das bilderwerk

So far there are no methods to test complex web 2.0 applications systematically and at low cost for malfunctions and security vulnerabilities. Therefore, computer scientists from Saarland University have developed a software system for checking complex web applications autonomously.

"The police have discovered a new variant of . The offender capitalizes on the complexity of social networks", reported a newspaper a month ago in Southern Germany. Valentin Dallmeier, postdoc at the software engineering chair at Saarland University, is not surprised. He says that the methods that and responsible project leaders rely on to try to find and security holes in have been too ineffective and inefficient. "This is still done manually and therefore causes not only very high costs, but also high levels of risk for companies and the community," Martin Burger explains. He works at the software engineering chair, too. Together the two postdocs want to change this serious deficit. Therefore they have developed the software system "Webmate", which determines automatically why Web 2.0 applications fail.

For the transfer of the technology to a spin-off, they have just received 500,000 Euros from the national support program "EXIST" run by the Federal Ministry of Economics and Technology (BMWi). The program is aimed at improving the entrepreneurial environment at universities and and at increasing the number of technology- and knowledge-based business start-ups.

So called Web 2.0 applications run centrally on an online server. Therefore, in contrast to conventional programs, they are not installed on the user's computer or laptop; instead, the user interacts with them via a web browser. In recent years, thanks to new web development technologies such as Asynchronous JavaScript and XML (AJAX), web applications can be used as smoothly as if they were installed on personal computers. AJAX takes care of organizing the transfer of data packets between the user's computer and server in such a way that the delays incurred by the connection are barely noticeable. Hence, not only private users but also companies and the public sector are adopting web applications more and more frequently. However, news about data theft and malfunctions is also reported on a daily basis.

Dallmeier and Burger want to prevent such worst-case scenarios and other breakdowns. Businesses and their responsible web administrators will only have to type in their Web address. Afterwards the system discovers automatically how the different components of the application are connected to each other and via which menus, buttons, and other control panels the users are interacting with the application. Subsequently, it generates and executes test scenarios. If it discovers, for example, that the application is not compatible with a certain version of a browser, or a control panel no longer exists in a new version of the application, the system informs the developer immediately—likewise if a database is not connected, a server does not respond, or a link is dead. The web developer is able to repeat this test at any time.

Dallmeier, Burger and the three other persons planning to found the spin-off are sure that their technology will succeed. They estimate the market potential in Germany alone to be 120 million Euros annually.

Explore further: Technology to help people with disabilities to learn and communicate

More information: www.st.cs.uni-saarland.de/webmate/

add to favorites email to friend print save as pdf

Related Stories

Google building online Chrome application shop

May 19, 2010

Google on Wednesday gave software developers an early peek at an online Chrome Web Store it is building as an emporium for games and other applications built for use on the Web.

How to Protect Your Web Server from Attacks

Oct 11, 2007

The National Institute of Standards and Technology has released a new publication that provides detailed tips on how to make web servers more resistant to potential attacks. Called “Guidelines on Securing Public Web Servers,” ...

An operating system in the cloud

Oct 09, 2012

Computer users are familiar to different degrees with the operating system that gets their machines up and running, whether that is the Microsoft Windows, Apple Mac, Linux, ChromeOS or other operating system. The OS handles ...

Recommended for you

BPG image format judged awesome versus JPEG

Dec 17, 2014

If these three letters could talk, BPG, they would say something like "Farewell, JPEG." Better Portable Graphics (BPG) is a new image format based on HEVC and supported by browsers with a small Javascript ...

Atari's 'E.T.' game joins Smithsonian collection

Dec 15, 2014

One of the "E.T." Atari game cartridges unearthed this year from a heap of garbage buried deep in the New Mexico desert has been added to the video game history collection at the Smithsonian.

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.