Performance Analysis of the Fuzzing Method in Detecting API Vulnerabilities in Mobile Healthcare Application X Based on OWASP API Security Top 10
Abstract
Keywords
Full Text:
Link DownloadReferences
Al-Naji, M., Zagrouba, R., & Al-Otaibi, S. (2024). A zero trust architecture for health information systems. Health and Technology, 14, 189–199. https://doi.org/10.1007/s12553-023-00809-4
Al-Rumaim, A., & Pawar, J. D. (2024). Exploring the evolving landscape of API security challenges in the healthcare industry: A comprehensive review. IEEE Access, 12, 10456-10478. https://doi.org/10.1109/SIN60469.2023.10474998
Alazmi, S., & Leon, D. C. de. (2022). A Systematic Literature Review on the Characteristics and Effectiveness of Web Application Vulnerability Scanners. IEEE Access, 10, 33200–33219. https://doi.org/10.1109/ACCESS.2022.3161522
Alsaidi, A., Alhuzali, A., & Bamasag, O. (2022). Effective and scalable black-box fuzzing approach for modern web applications. Journal of King Saud University - Computer and Information Sciences. https://doi.org/10.1016/j.jksuci.2022.10.006
Atlidakis, V., Godefroid, P., & Polishchuk, M. (2019). RESTler: Stateful REST API fuzzing. In Proceedings of the 41st International Conference on Software Engineering (ICSE) (pp. 748-758). IEEE Press. https://doi.org/10.1109/ICSE.2019.00083
Augustine, N., Sultan, A. M., Osman, M., & Sharif, K. (2024). Application of artificial intelligence in detecting SQL injection attacks. International Journal on Informatics Visualization, 8(4), 2131– 2138. https://doi.org/10.62527/joiv.8.4.3631
Cinar, A. C., & Kara, T. B. (2023). The current state and future of mobile security in the light of the recent mobile security threat reports. Multimedia Tools and Applications, 82, 20269–20281. https://doi.org/10.1007/s11042-023-14400-6
Dalimunthe, S., Putra, E. H., & Ridha, M. A. F. (2023). Restful API security using JSON Web Token (JWT) with HMAC-Sha512 algorithm in session management. IT Journal Research and Development, 8(1), 81–94. https://doi.org/10.25299/itjrd.2023.12029
Eceiza, M., Flores, J. L., & Iturbe, M. (2023). Improving fuzzing assessment methods through the analysis of metrics and experimental conditions. Computers & Security, 124, 102946. https://doi.org/10.1016/j.cose.2022.102946
Ehsan, A., Abuhaliqa, M. A. M. E., Catal, C., & Mishra, D. (2022). RESTful API testing methodologies: Rationale, challenges, and solution directions. Applied Sciences, 12(9), 4369. https://doi.org/10.3390/app12094369
Feio, D., & Pardal, M. L. (2024). An empirical study of DevSecOps focused on continuous security testing. Proceedings of the 2024 IEEE International Workshop on Security and Trust Management (STM). https://doi.org/10.1109/EuroSPW61312.2024.00074
Godefroid, P., Huang, B.-Y., & Polishchuk, M. (2020). Intelligent REST API data fuzzing. In Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (pp. 725–736). ACM. https://doi.org/10.1145/3368089.3409719
Gowda, P., & Gowda, A. N. (2024). Best practices in REST API design for enhanced scalability and security. Journal of Artificial Intelligence, Machine Learning and Data Science, 2(1), 827–830. https://doi.org/10.51219/JAIMLD/priyanka-gowda/202
Idris, M., Syarif, I., & Winarno, I. (2022). Web application security education platform based on OWASP API security project. EMITTER International Journal of Engineering Technology, 10(2), 246– 261. https://doi.org/10.24003/emitter.v10i2.705
Liu, Y., Li, Y., Deng, G., Liu, Y., Wan, R., Wu, R., et al. (2022). MOREST: Model-based RESTful API testing with execution feedback. In Proceedings of the 44th International Conference on Software Engineering (ICSE '22) (pp. 1-12). ACM. https://doi.org/10.1145/3510003.3510133
Manchana, R. (2024). DevSecOps in cloud native cybersecurity: Shifting left for early security, securing right with continuous protection. International Journal of Science and Research (IJSR), 13(8), 1– 8. https://www.researchgate.net/publication/383403159
Martin-Lopez, A., Segura, S., & Ruiz-Cortés, A. (2019). Test coverage criteria for RESTful web APIs. In Proceedings of the 10th ACM SIGSOFT International Workshop on Automating TEST Case Design, Selection, and Evaluation (A-TEST '19) (pp. 15-21). ACM. https://doi.org/10.1145/3340433.3342822
Mateus-Coelho, N., Cruz-Cunha, M., & Ferreira, L. G. (2021). Security in microservices architectures. Procedia Computer Science, 181, 1225–1236. https://doi.org/10.1016/j.procs.2021.01.320
Papageorgiou, A., Strigkos, M., Politou, E., Alepis, E., Solanas, A., & Patsakis, C. (2018). Security and privacy analysis of mobile health applications: The alarming state of practice. IEEE Access, 6, 9390–9403. https://doi.org/10.1109/ACCESS.2018.2799522
Putra, R. A., Kautsar, I. A., Hindarto, H., & Sumarno, S. (2023). Detection and prevention of insecure direct object references (IDOR) in website-based applications. Procedia of Engineering and Life Science, 4, 1–7. https://doi.org/10.21070/pels.v4i0.1435
Sconiers-Hasan, M. (2024). Application programming interface (API) vulnerabilities and risks (Special Report CMU/SEI-2024-SR-004). Software Engineering Institute, Carnegie Mellon University. https://doi.org/10.1184/R1/25282342
Sivakumar, K., & Thilagam, P. S. (2025). Vulnerability testing of RESTful APIs against application layer DDoS attacks. International Journal of Advanced Computer Science and Applications, 16(3).
Sutter, T., Kehrer, T., Rennhard, M., Tellenbach, B., & Klein, J. (2024). Dynamic security analysis on Android: A systematic literature review. IEEE Access, 12, 57261–57287. https://doi.org/10.1109/ACCESS.2024.3390612
DOI: http://dx.doi.org/10.35671/telematika.v19i1.3149
Refbacks
- There are currently no refbacks.
Indexed by:
Telematika
ISSN: 2442-4528 (online) | ISSN: 1979-925X (print)
Published by : Universitas Amikom Purwokerto
Jl. Let. Jend. POL SUMARTO Watumas, Purwonegoro - Purwokerto, Indonesia
This work is licensed under a Creative Commons Attribution 4.0 International License .




