A Model-Based Approach for Crawling Rich Internet Applications

被引:14
作者
Dincturk, Mustafa Emre [1 ]
Jourdan, Guy-Vincent [1 ]
Bochmann, Gregor V. [1 ]
Onut, Iosif Viorel [2 ]
机构
[1] Univ Ottawa, EECS, Ottawa, ON K1N 6N5, Canada
[2] IBM Corp, IBM Secur AppScan Enterprise, Res & Dev, Ottawa, ON K2V 1C8, Canada
关键词
Design; Algorithms; Experimentation; Crawling; rich Internet applications; AJAX; modeling; dynamic analysis; DOM;
D O I
10.1145/2626371
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
New Web technologies, like AJAX, result in more responsive and interactive Web applications, sometimes called Rich Internet Applications (RIAs). Crawling techniques developed for traditional Web applications are not sufficient for crawling RIAs. The inability to crawl RIAs is a problem that needs to be addressed for at least making RIAs searchable and testable. We present a new methodology, called "model-based crawling", that can be used as a basis to design efficient crawling strategies for RIAs. We illustrate model-based crawling with a sample strategy, called the "hypercube strategy". The performances of our model-based crawling strategies are compared against existing standard crawling strategies, including breadth-first, depth-first, and a greedy strategy. Experimental results show that our model-based crawling approach is significantly more efficient than these standard strategies.
引用
收藏
页数:39
相关论文
共 41 条
[1]  
Aigner M., 1973, Journal of Combinatorial Theory, Series B, V14, P187, DOI 10.1016/0095-8956(73)90001-4
[2]  
Amalfitano Domenico, 2010, Proceedings of the IEEE Third International Conference on Software Testing Verification and Validation - Workshops (ICSTW 2010), P274, DOI 10.1109/ICSTW.2010.34
[3]   Reverse Engineering Finite State Machines from Rich Internet Applications [J].
Amalfitano, Domenico ;
Fasolino, Anna Rita ;
Tramontana, Porfirlo .
FIFTEENTH WORKING CONFERENCE ON REVERSE ENGINEERING, PROCEEDINGS, 2008, :69-+
[4]  
Anderson I., 1987, AP FLEX
[5]  
Anderson I., 1987, Combinatorics of finite sets
[6]  
[Anonymous], 1951, NIEUW ARCH WISKD
[7]  
[Anonymous], 2003, ACM Transactions on Internet Technology (TOIT), DOI DOI 10.1145/857166.857170
[8]  
[Anonymous], 2001, ACM T INTERNET TECHN, DOI DOI 10.1145/383034.383035
[9]   State of the Art: Automated Black-Box Web Application Vulnerability Testing [J].
Bau, Jason ;
Bursztein, Elie ;
Gupta, Divij ;
Mitchell, John .
2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, :332-345
[10]  
Benjamin Kamara, 2010, Proceedings of the IEEE Third International Conference on Software Testing Verification and Validation - Workshops (ICSTW 2010), P403, DOI 10.1109/ICSTW.2010.46