| Abstract: This paper presents an overview of basic
principles of static and dynamic analysis of web
applications in vulnerability detection. A typical usage has
been given for each of the techniques described in the
paper, along with the special conditions that would deem
the particular technique inapplicable. Finally, in order to
illustrate the process of threat detection, a detailed
example was given that utilizes both of the methods
described in the paper. |