ACKNOWLEDGEMENTS
This work was supported by funding from the topic
Engineering Secure Systems of the Helmholtz Asso-
ciation (HGF).
REFERENCES
Aggarwal, C. C., Hinneburg, A., and Keim, D. A. (2001).
On the surprising behavior of distance metrics in high
dimensional space. In International conference on
database theory, pages 420–434. Springer.
Aichernig, B. K., Mu
ˇ
skardin, E., and Pferscher, A. (2021).
Learning-based fuzzing of iot message brokers. In
2021 14th IEEE Conference on Software Testing, Ver-
ification and Validation (ICST), pages 47–58. IEEE.
Alidoosti, M., Nowroozi, A., and Nickabadi, A. (2019). Bl-
prom: A black-box approach for detecting business-
layer processes in the web applications. Journal of
Computing and Security, 6(2):65–80.
Borcherding, A., Pfrang, S., Haas, C., Weiche, A., and Bey-
erer, J. (2020). Helper-in-the-middle: Supporting web
application scanners targeting industrial control sys-
tems. In 17th International Joint Conference on e-
Business and Telecommunications, pages 27–38.
Doup
´
e, A., Cavedon, L., Kruegel, C., and Vigna, G. (2012).
Enemy of the state: A state-aware black-box web vul-
nerability scanner. In 21st USENIX Security Sympo-
sium (USENIX Security 12), pages 523–538.
Doup
´
e, A., Cova, M., and Vigna, G. (2010). Why johnny
can’t pentest: An analysis of black-box web vulner-
ability scanners. In International Conference on De-
tection of Intrusions and Malware, and Vulnerability
Assessment, pages 111–131. Springer.
Drakonakis, K., Ioannidis, S., and Polakis, J. (2020). The
cookie hunter: Automated black-box auditing for web
authentication and authorization flaws. In 2020 ACM
SIGSAC Conference on Computer and Communica-
tions Security, pages 1953–1970.
Ester, M., Kriegel, H.-P., Sander, J., Xu, X., et al. (1996).
A density-based algorithm for discovering clusters in
large spatial databases with noise. In The Second In-
ternational Conference on Knowledge Discovery and
Data Mining, pages 226–231.
Gauthier, F., Hassanshahi, B., Selwyn-Smith, B., Mai, T. N.,
Schl
¨
uter, M., and Williams, M. (2021). Backrest: A
model-based feedback-driven greybox fuzzer for web
applications. arXiv preprint arXiv:2108.08455.
Hassanshahi, B., Lee, H., and Krishnan, P. (2022). Gelato:
Feedback-driven and guided security analysis of
client-side web applications. In 2022 IEEE Inter-
national Conference on Software Analysis, Evolution
and Reengineering (SANER), pages 618–629. IEEE.
Li, Y., Sun, Z.-G., and Jiang, T.-T. (2018). An automated
test suite generating approach for stateful web ser-
vices. In International Conference on Software Anal-
ysis, Testing, and Evolution, pages 185–201. Springer.
Lin, J.-W., Wang, F., and Chu, P. (2017). Using se-
mantic similarity in crawling-based web application
testing. In 2017 IEEE International Conference on
Software Testing, Verification and Validation (ICST),
pages 138–148. IEEE.
Lin, Z., King, I., and Lyu, M. R. (2006). Pagesim: A novel
link-based similarity measure for the world wide web.
In 2006 IEEE/WIC/ACM International Conference on
Web Intelligence (WI 2006 Main Conference Proceed-
ings)(WI’06), pages 687–693. IEEE.
Liu, D., Pham, V.-T., Ernst, G., Murray, T., and Rubin-
stein, B. I. (2022). State selection algorithms and their
impact on the performance of stateful network proto-
col fuzzing. In 2022 IEEE International Conference
on Software Analysis, Evolution and Reengineering
(SANER), pages 720–730. IEEE.
Mesbah, A., Bozdag, E., and Van Deursen, A. (2008).
Crawling ajax by inferring user interface state
changes. In 2008 Eighth International Conference on
Web Engineering, pages 122–134. IEEE.
Mirsky, Y., Doitshman, T., Elovici, Y., and Shabtai, A.
(2018). Kitsune: an ensemble of autoencoders for on-
line network intrusion detection. In Network and Dis-
tributed Systems Security (NDSS) Symposium 2018.
Oliver, J., Cheng, C., and Chen, Y. (2013). Tlsh–a locality
sensitive hash. In 2013 Fourth Cybercrime and Trust-
worthy Computing Workshop, pages 7–13. IEEE.
Pferscher, A. and Aichernig, B. K. (2022). Stateful black-
box fuzzing of bluetooth devices using automata
learning. In NASA Formal Methods Symposium, pages
373–392. Springer.
Pfrang, S., Borcherding, A., Meier, D., and Beyerer, J.
(2019). Automated security testing for web applica-
tions on industrial automation and control systems. at-
Automatisierungstechnik, 67(5):383–401.
Popescu, D. A. and Nicolae, D. (2014). Determining the
similarity of two web applications using the edit dis-
tance. In International workshop soft computing ap-
plications, pages 681–690. Springer.
Raffelt, H., Steffen, B., and Berg, T. (2005). Learnlib: A
library for automata learning and experimentation. In
10th international workshop on Formal methods for
industrial critical systems, pages 62–71.
Schubert, E., Sander, J., Ester, M., Kriegel, H. P., and Xu,
X. (2017). Dbscan revisited, revisited: why and how
you should (still) use dbscan. ACM Transactions on
Database Systems (TODS), 42(3):1–21.
Shahapure, K. R. and Nicholas, C. (2020). Cluster qual-
ity analysis using silhouette score. In 2020 IEEE 7th
International Conference on Data Science and Ad-
vanced Analytics (DSAA), pages 747–748. IEEE.
Vaandrager, F., Garhewal, B., Rot, J., and Wißmann, T.
(2022). A new approach for active automata learning
based on apartness. In International Conference on
Tools and Algorithms for the Construction and Analy-
sis of Systems, pages 223–243. Springer.
Yandrapally, R., Stocco, A., and Mesbah, A. (2020). Near-
duplicate detection in web app model inference. In
ACM/IEEE 42nd international conference on software
engineering, pages 186–197.
SWaTEval: An Evaluation Framework for Stateful Web Application Testing
441