Abstract
We consider the case where a knowledge base consists of interactions among parameter values in an input parameter model for
web application security testing. The input model gives rise to attack strings to be used for exploiting XSS vulnerabilities,
a critical threat towards the security of web applications. Testing results are then annotated with a vulnerability triggering
or non-triggering classification, and such security knowledge findings are added back to the knowledge base, making the resulting
attack capabilities superior for newly requested input models. We present our approach as an iterative process that evolves
an input model for security testing. Empirical evaluation on six real-world web application shows that the process effectively
evolves a knowledge base for XSS vulnerability detection, achieving on average 78.8\% accuracy.
[download the pdf file] [DOI]