Alok Agarrwal

Work place: Dept. of Computer Science & Engineering, JIIT University, Noida, India

E-mail: alok289@yahoo.com

Website:

Research Interests: Computer Architecture and Organization, Computing Platform, Data Structures and Algorithms, Mathematics of Computing

Biography

Dr. Alok Aggarwal, received his graduation and post graduation degrees in Computer Science and Engineering in 1995 and 2001 respectively. He received Ph.D. degree in Mobile Computing discipline in 2010 from IIT Roorkee. Currently he is with Computer Science and Engineering/Information Technology Dept. of JIIT University, Noida. He has edited three books and about 50 research papers published in various International/National journals, conference proceedings. He has a mix experience of Industry, Research and Teaching of about 15 years. His area of interest is Mobile Computing and Object Oriented Programming. 

Author Articles
Finding Vulnerabilities in Rich Internet Applications (Flex/AS3) Using Static Techniques

By Sreenivasa Rao Basavala Narendra Kumar Alok Agarrwal

DOI: https://doi.org/10.5815/ijmecs.2012.01.05, Pub. Date: 8 Jan. 2012

The number and the importance of Rich Internet Applications (RIA) have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such rich internet applications (RIA) have increasing as well. Since manual code reviews are time consuming, error prone and costly and it need skilled developers or programmers to review the manual source code review, the need for automated solutions has become evident. In this paper, we address the problem of application security vulnerable detection in Adobe Flex (Rich Internet Applications) platform in web 2.0 applications by means of static source code analysis. To this end, we present precise analysis targeted at the unique reference semantics commonly found in RIA based web applications or widgets (small applications which will run on fly i.e. drag and drop) developed in Adobe Flex Framework or Action Script 3.0. Moreover, we enhance the quality and quantity of the generated vulnerability reports. 

[...] Read more.
Other Articles