{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:29Z","timestamp":1750309589441,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,17]]},"DOI":"10.1145\/3723178.3723203","type":"proceedings-article","created":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T07:16:47Z","timestamp":1749194207000},"page":"183-191","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["The Resilience of Digital Bangladesh: A Case Study on Web Vulnerabilities in the Private Sector of Bangladesh"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-3735-8272","authenticated-orcid":false,"given":"Rabeya Hossain","family":"Dolon","sequence":"first","affiliation":[{"name":"Computer Science and Engineering (CSE), Stamford University Bangladesh, Dhaka, Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5964-675X","authenticated-orcid":false,"given":"Muhammad","family":"Ridowan","sequence":"additional","affiliation":[{"name":"TigerIT Bangladesh Ltd., Dhaka, Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0160-4212","authenticated-orcid":false,"given":"Israt Jahan","family":"Mouri","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering (CSE), Bangladesh University of Engineering and Technology (BUET), Dhaka, Dhaka, Bangladesh"}]}],"member":"320","published-online":{"date-parts":[[2025,6,6]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"Atharva Mangesh\u00a0Kumar Agrawal Durga\u00a0Bhagavan Bolli C Teja Tushar\u00a0Parmanand Budhwani Lakshitaa Sehgal Jash\u00a0Nimesh Dharia and Anshal Aggarwal. 2021. Offensive Web Application Security Framework. Design Engineering (London)9 (2021) 17334\u201317342."},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/InfoSec.2015.7435521"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSec.2015.23"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"crossref","unstructured":"Adam Bates Kevin Butler Wensheng Zhang and Trent Jaeger. 2016. Securing SQL-Driven Web Applications through Automatic Query Transformation. ACM Transactions on the Web 10 2 (2016) 1\u201329.","DOI":"10.1145\/2873061"},{"key":"e_1_3_3_2_6_2","unstructured":"Business\u00a0Inspection BD. 2023. Top 10 best newspapers in Bangladesh in 2023. https:\/\/businessinspection.com.bd\/popular-newspapers-in-bangladesh\/"},{"key":"e_1_3_3_2_7_2","unstructured":"Business\u00a0Inspection BD. 2023. Top 10 group of companies in Bangladesh. https:\/\/businessinspection.com.bd\/top-group-of-companies-in-bd\/"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.5555\/1036280"},{"key":"e_1_3_3_2_9_2","volume-title":"Computer Security: Art and Science","author":"Bishop Matt","year":"2018","unstructured":"Matt Bishop. 2018. Computer Security: Art and Science. Addison-Wesley."},{"key":"e_1_3_3_2_10_2","volume-title":"SQL injection attacks and defense","author":"Clarke-Salt Justin","year":"2009","unstructured":"Justin Clarke-Salt. 2009. SQL injection attacks and defense. Elsevier."},{"key":"e_1_3_3_2_11_2","volume-title":"The basics of hacking and penetration testing: ethical hacking and penetration testing made easy","author":"Engebretson Patrick","year":"2013","unstructured":"Patrick Engebretson. 2013. The basics of hacking and penetration testing: ethical hacking and penetration testing made easy. Elsevier."},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/WorldCIS.2015.7359432"},{"key":"e_1_3_3_2_13_2","volume-title":"OWASP Foundation, Inc","author":"Foundation OWASP","year":"2024","unstructured":"OWASP Foundation. 2024. OWASP Foundation, Inc. https:\/\/owasp.org\/ Accessed: 2024-08-08."},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699107"},{"key":"e_1_3_3_2_15_2","volume-title":"Computer Security","author":"Gollmann Dieter","year":"2011","unstructured":"Dieter Gollmann. 2011. Computer Security. John Wiley & Sons."},{"key":"e_1_3_3_2_16_2","unstructured":"Mahmudul Hasan. 2023. Internet subscriber base sees growth for 4th month straight. https:\/\/www.thedailystar.net\/business\/economy\/news\/internet-subscriber-base-sees-growth-4th-month-straight-3361206"},{"key":"e_1_3_3_2_17_2","volume-title":"International Conference on Cyber Security and Computer Science 2018","author":"Hassan M","year":"2018","unstructured":"M Hassan, M Ali, T Bhuiyan, M Sharif, and S Biswas. 2018. Quantitative assessment on broken access control vulnerability in web applications. In International Conference on Cyber Security and Computer Science 2018."},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"crossref","unstructured":"Md\u00a0Maruf Hassan Shamima\u00a0Sultana Nipa Marjan Akter Rafita Haque Fabiha\u00a0Nawar Deepa Mostafijur Rahman Md\u00a0Asif Siddiqui Md\u00a0Hasan Sharif et\u00a0al. 2018. Broken authentication and session management vulnerability: a case study of web application. Int. J. Simul. Syst. Sci. Technol 19 2 (2018) 1\u201311.","DOI":"10.5013\/IJSSST.a.19.02.06"},{"key":"e_1_3_3_2_19_2","unstructured":"Mohammad\u00a0Ershadul Karim. 2022. Cyber law in Bangladesh. Cyber Law in Bangladesh (2022) 1\u2013392."},{"key":"e_1_3_3_2_20_2","unstructured":"S Katkar\u00a0Anjali and B Kulkarni\u00a0Raj. 2012. Web vulnerability detection and security mechanism. International Journal of Soft Computing and Engineering (IJSCE) ISSN 223 (2012) 1\u20132307."},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMITCon.2019.8862224"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCE.2011.5973873"},{"key":"e_1_3_3_2_23_2","unstructured":"Kirtibas.biswas@gmail.com. 2022. Top 10 private medical colleges in Bangladesh: New ranking. https:\/\/www.mbbsinbd.com\/top-10-private-medical-colleges-in-bangladesh\/"},{"key":"e_1_3_3_2_24_2","volume-title":"Burp Suite Essentials","author":"Mahajan Akash","year":"2014","unstructured":"Akash Mahajan. 2014. Burp Suite Essentials. Packt Publishing Ltd."},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"crossref","unstructured":"Sabyasachi Mitra and Sam Ransbotham. 2015. Information disclosure and the diffusion of information security attacks. Information Systems Research 26 3 (2015) 565\u2013584.","DOI":"10.1287\/isre.2015.0587"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"crossref","unstructured":"Aswathy Mohan and Dr\u00a0G\u00a0Aravind Swaminathan. 2022. Analysis of Vulnerabilityassessment with Penetration Testing. Available at SSRN 4040684 (2022).","DOI":"10.2139\/ssrn.4040684"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/ECACE.2019.8679426"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/SysSec.2011.28"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3377049.3377107"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8446"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"crossref","unstructured":"Ravi Sandhu Edward Coyne Hal Feinstein and Charles Youman. 1996. Role-Based Access Control Models. IEEE Computer 29 2 (1996) 38\u201347.","DOI":"10.1109\/2.485845"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"crossref","unstructured":"Ron Staley and John Berg. 2017. Deploying Web Application Firewalls. Network Security 2017 1 (2017) 11\u201313.","DOI":"10.1016\/S1353-4858(17)30082-X"},{"key":"e_1_3_3_2_33_2","volume-title":"Information Security: Principles and Practice","author":"Stallings William","year":"2012","unstructured":"William Stallings. 2012. Information Security: Principles and Practice. Pearson."},{"key":"e_1_3_3_2_34_2","volume-title":"Network Security Essentials: Applications and Standards","author":"Stallings William","year":"2013","unstructured":"William Stallings. 2013. Network Security Essentials: Applications and Standards. Pearson."},{"key":"e_1_3_3_2_35_2","volume-title":"Cryptography and Network Security: Principles and Practice","author":"Stallings William","year":"2020","unstructured":"William Stallings. 2020. Cryptography and Network Security: Principles and Practice. Pearson."},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"crossref","unstructured":"Anastasios Stasinopoulos Christoforos Ntantogian and Christos Xenakis. 2019. Commix: automating evaluation and exploitation of command injection vulnerabilities in web applications. International Journal of Information Security 18 (2019) 49\u201372.","DOI":"10.1007\/s10207-018-0399-z"},{"key":"e_1_3_3_2_37_2","unstructured":"Kaspersky Statistics. 2022. Kaspersky Security Bulletin 2022. 2022\u00a0pages. https:\/\/go.kaspersky.com\/rs\/802-IJN-240\/images\/KSB_statistics_2022_en_final.pdf"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2014.6799699"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"crossref","unstructured":"Mumina Uddin Shareeful Islam and Ameer Al-Nemrat. 2019. A dynamic access control model using authorising workflow and task-role-based access control. Ieee Access 7 (2019) 166676\u2013166689.","DOI":"10.1109\/ACCESS.2019.2947377"},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368112"},{"key":"e_1_3_3_2_41_2","volume-title":"Penetration testing: a hands-on introduction to hacking","author":"Weidman Georgia","year":"2014","unstructured":"Georgia Weidman. 2014. Penetration testing: a hands-on introduction to hacking. No starch press."},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134016"}],"event":{"name":"ICCA 2024: 3rd International Conference on Computing Advancements","acronym":"ICCA 2024","location":"Dhaka Bangladesh"},"container-title":["Proceedings of the 3rd International Conference on Computing Advancements"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723178.3723203","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3723178.3723203","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:56:46Z","timestamp":1750298206000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723178.3723203"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,17]]},"references-count":41,"alternative-id":["10.1145\/3723178.3723203","10.1145\/3723178"],"URL":"https:\/\/doi.org\/10.1145\/3723178.3723203","relation":{},"subject":[],"published":{"date-parts":[[2024,10,17]]},"assertion":[{"value":"2025-06-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}