I
nd
o
ne
s
ia
n J
o
urna
l o
f
E
lect
rica
l En
g
ineering
a
nd
Co
m
pu
t
er
Science
Vo
l.
3
9
,
No
.
3
,
Sep
tem
b
er
2
0
2
5
,
p
p
.
1
8
0
7
~
1
814
I
SS
N:
2
5
0
2
-
4
7
5
2
,
DOI
: 1
0
.
1
1
5
9
1
/ijeecs.v
3
9
.i
3
.
pp
1
8
0
7
-
1
8
1
4
1807
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ij
ee
cs.ia
esco
r
e.
co
m
Co
mprehens
iv
e s
ecure
co
de
review
ana
ly
sis
of web
a
pplica
tion securi
ty v
ulnera
bilities
Azlinda
Ab
du
l A
ziz
1
,
N
ur
R
a
zia
M
o
hd
Su
ra
di
2
,
Ra
ha
y
u
H
a
nd
a
n
2
,
M
o
hd
No
o
r
Riza
l A
rba
in
2
1
F
a
c
u
l
t
y
o
f
C
o
mp
u
t
e
r
a
n
d
M
a
t
h
e
ma
t
i
c
a
l
S
c
i
e
n
c
e
s
,
U
n
i
v
e
r
si
t
i
Te
k
n
o
l
o
g
i
M
A
R
A
(
U
i
T
M
)
M
e
l
a
k
a
,
C
a
mp
u
s J
a
si
n
,
M
e
l
a
k
a
,
M
a
l
a
y
s
i
a
2
F
a
c
u
l
t
y
o
f
C
o
mm
u
n
i
c
a
t
i
o
n
,
V
i
su
a
l
A
r
t
s a
n
d
C
o
m
p
u
t
e
r
,
U
n
i
v
e
r
si
t
i
S
e
l
a
n
g
o
r
,
S
e
l
a
n
g
o
r
,
M
a
l
a
y
s
i
a
Art
icle
I
nfo
AB
S
T
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
No
v
11
,
2
0
2
4
R
ev
is
ed
Ap
r
7
,
2
0
2
5
Acc
ep
ted
J
u
l
2
,
2
0
2
5
A
se
c
u
re
c
o
d
e
re
v
iew
is
a
p
r
o
c
e
ss
o
f
s
o
ftwa
re
d
e
v
e
l
o
p
m
e
n
t
in
v
o
l
v
e
s
sy
ste
m
a
ti
c
e
x
a
m
in
a
ti
o
n
o
f
a
p
p
l
ica
ti
o
n
c
o
d
e
.
H
o
we
v
e
r,
we
b
a
p
p
li
c
a
ti
o
n
s
e
v
o
lv
in
g
o
f
c
y
b
e
r
th
re
a
ts
m
a
k
e
s
i
t
c
h
a
ll
e
n
g
in
g
to
c
o
n
d
u
c
t
a
d
e
q
u
a
te
se
c
u
rit
y
.
Th
e
re
fo
re
,
t
h
is
p
a
p
e
r
c
o
n
d
u
c
ts
a
c
o
m
p
re
h
e
n
siv
e
se
c
u
re
c
o
d
e
re
v
iew
a
n
a
ly
sis
to
p
r
o
tec
t
a
n
y
c
ru
c
ial
a
sp
e
c
t
o
f
we
b
se
c
u
rit
y
fro
m
p
o
te
n
ti
a
l
th
re
a
ts
a
n
d
v
u
l
n
e
ra
b
il
it
ies
.
Th
e
a
p
p
li
c
a
ti
o
n
c
o
d
e
is
sc
a
n
n
e
d
f
o
r
se
c
u
rit
y
issu
e
s d
u
ri
n
g
th
e
re
a
l
re
v
iew
,
a
n
d
t
h
e
re
su
lt
s
a
re
c
las
sified
a
c
c
o
rd
in
g
t
o
t
h
e
a
re
a
s
o
f
v
u
l
n
e
ra
b
il
it
y
.
As
a
re
su
l
t,
th
e
a
p
p
li
c
a
ti
o
n
c
o
d
e
risk
lev
e
l
a
n
d
li
st
o
f
risk
c
a
teg
o
ries
we
re
d
e
fin
e
d
.
Th
is
re
su
lt
a
ss
ists
in
p
rio
ri
ti
z
in
g
issu
e
s
fo
r
re
so
lu
ti
o
n
,
b
e
g
in
n
in
g
with
th
e
m
o
st
c
rit
ica
l
p
ro
b
lem
s
to
l
o
we
r
risk
lev
e
ls.
Ne
x
t,
a
li
st
o
f
risk
c
a
teg
o
ries
th
a
t
g
iv
e
t
h
e
m
o
st
si
g
n
ifi
c
a
n
t
se
c
u
rit
y
v
u
l
n
e
ra
b
il
it
ies
a
ffe
c
ti
n
g
a
p
p
li
c
a
ti
o
n
c
o
d
e
s
is
d
e
fin
e
d
.
S
QL
i
n
jec
ti
o
n
,
we
a
k
p
a
ss
wo
rd
h
a
n
d
li
n
g
,
in
se
c
u
re
d
ire
c
t
o
b
jec
t
re
fe
re
n
c
e
,
in
f
o
rm
a
ti
o
n
e
x
p
o
s
u
re
,
imp
ro
p
e
r
se
ss
io
n
m
a
n
a
g
e
m
e
n
t
,
m
issin
g
in
p
u
t
v
a
l
id
a
ti
o
n
,
d
e
p
re
c
a
ted
fu
n
c
ti
o
n
s,
a
n
d
lac
k
o
f
c
o
m
m
e
n
ts
a
re
d
e
fin
e
d
a
s
a
risk
c
a
teg
o
ry
.
M
o
re
o
v
e
r,
th
e
re
su
lt
o
f
a
p
p
l
ica
ti
o
n
c
o
d
e
we
a
k
n
e
ss
in
t
h
e
se
c
u
rit
y
o
f
t
h
e
a
p
p
li
c
a
ti
o
n
c
o
d
e
is
d
e
term
in
e
d
b
a
se
d
o
n
t
h
e
lev
e
l
o
f
ris
k
a
n
d
c
a
teg
o
ries
.
Th
u
s,
th
e
a
n
a
ly
sis
re
su
lt
o
ffe
rs
t
h
e
d
e
v
e
lo
p
e
rs
a
c
lea
r
p
e
rsp
e
c
ti
v
e
o
n
p
ro
t
e
c
ti
n
g
t
h
e
we
b
a
p
p
li
c
a
ti
o
n
s fr
o
m
th
re
a
ts an
d
v
u
l
n
e
ra
b
il
it
ies
.
K
ey
w
o
r
d
s
:
C
y
b
er
th
r
ea
d
R
is
k
Secu
r
e
co
d
e
Secu
r
ity
Vu
ln
er
ab
ilit
ies
W
eb
ap
p
licatio
n
T
h
is i
s
a
n
o
p
e
n
a
c
c
e
ss
a
rticle
u
n
d
e
r th
e
CC B
Y
-
SA
li
c
e
n
se
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Azlin
d
a
Ab
d
u
l A
ziz
Facu
lty
o
f
C
o
m
p
u
ter
an
d
Ma
th
em
atica
l Scie
n
ce
s
,
Un
iv
er
s
iti T
ek
n
o
lo
g
i M
AR
A
(
UiT
M)
Me
lak
a
C
am
p
u
s
J
asin
,
Me
lak
a,
Ma
lay
s
ia
E
m
ail:
az
lin
d
aa
ziz@u
itm
.
ed
u
.
m
y
1.
I
NT
RO
D
UCT
I
O
N
W
eb
ap
p
licatio
n
s
p
lay
a
cr
iti
ca
l
r
o
le
in
m
o
d
e
r
n
d
ig
ital
ec
o
s
y
s
tem
s
,
s
u
p
p
o
r
tin
g
ess
en
tial
s
er
v
ices
ac
r
o
s
s
v
ar
io
u
s
in
d
u
s
tr
ies.
Strict
m
ea
s
u
r
es
m
u
s
t
b
e
tak
en
at
ev
er
y
le
v
el
o
f
th
e
s
o
f
twar
e
d
e
v
elo
p
m
en
t
life
cy
cle
b
ec
au
s
e
o
f
t
h
e
wid
esp
r
ea
d
u
s
e
o
f
th
ese
d
e
v
ices,
wh
ich
o
f
te
n
m
ak
es
th
em
th
e
tar
g
et
o
f
s
e
cu
r
ity
attac
k
s
.
On
e
cr
u
cial
ap
p
r
o
ac
h
to
s
af
eg
u
ar
d
in
g
web
ap
p
licatio
n
s
is
s
ec
u
r
e
co
d
e
r
ev
iew,
a
p
r
o
ce
s
s
in
wh
ich
d
ev
el
o
p
er
s
an
aly
ze
ap
p
licatio
n
co
d
e
to
id
en
tify
an
d
m
itig
ate
s
ec
u
r
ity
v
u
ln
er
ab
ilit
ies,
en
h
a
n
ce
co
d
e
q
u
ality
an
d
e
n
s
u
r
e
co
m
p
lian
ce
with
s
ec
u
r
ity
s
tan
d
ar
d
s
[
1
]
.
T
h
is
p
r
o
ce
s
s
is
ess
en
tia
l
f
o
r
s
af
eg
u
ar
d
in
g
web
ap
p
licatio
n
s
,
esp
ec
ially
th
o
s
e
h
an
d
lin
g
s
e
n
s
itiv
e
d
ata,
f
r
o
m
p
o
ten
tial
cy
b
er
th
r
ea
ts
an
d
attac
k
s
[
2
]
.
Ho
wev
er
,
th
e
co
m
p
lex
ity
o
f
m
o
d
e
r
n
we
b
ap
p
licatio
n
s
an
d
th
e
c
o
n
s
tan
tly
e
v
o
lv
in
g
n
atu
r
e
o
f
cy
b
er
t
h
r
ea
t
s
m
ak
e
co
n
d
u
ctin
g
ef
f
ec
tiv
e
s
ec
u
r
ity
r
e
v
iews
ch
allen
g
in
g
[
3
]
.
Fu
r
t
h
er
m
o
r
e,
o
n
g
o
in
g
tr
ain
in
g
h
elp
s
d
e
v
elo
p
er
s
s
tay
in
f
o
r
m
e
d
ab
o
u
t
th
e
latest
s
ec
u
r
ity
th
r
ea
ts
an
d
b
est
p
r
ac
tices.
I
n
co
r
p
o
r
atin
g
s
ec
u
r
ity
m
ea
s
u
r
es
ea
r
ly
in
th
e
d
ev
elo
p
m
en
t
life
cy
cle
h
elp
s
estab
lis
h
a
s
tr
o
n
g
f
o
u
n
d
atio
n
f
o
r
s
ec
u
r
e
c
o
d
in
g
[
4
]
.
On
e
o
f
th
e
m
ai
n
o
b
j
ec
t
iv
es
o
f
s
ec
u
r
e
c
o
d
e
r
ev
iews
is
t
o
i
d
e
n
t
if
y
a
n
d
f
i
x
s
ec
u
r
it
y
v
u
ln
e
r
a
b
il
i
ties
b
e
f
o
r
e
d
e
p
l
o
y
m
e
n
t.
T
h
er
ef
o
r
e
,
th
is
p
r
o
c
ess
h
e
lp
s
p
r
e
v
e
n
t
c
o
m
m
o
n
t
h
r
ea
ts
s
u
c
h
as
SQ
L
in
jec
ti
o
n
,
cr
o
s
s
-
s
ite
s
c
r
i
p
t
in
g
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
5
2
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
,
Vo
l.
3
9
,
No
.
3
,
Sep
tem
b
er
20
25
:
1
8
0
7
-
1
8
1
4
1808
(
XSS
)
,
a
n
d
c
r
o
s
s
-
s
it
e
r
e
q
u
est f
o
r
g
er
y
(
C
SR
F)
,
w
h
i
ch
c
o
u
l
d
c
o
m
p
r
o
m
is
e
s
e
n
s
i
ti
v
e
d
a
ta
an
d
s
y
s
te
m
s
ec
u
r
it
y
[
5
]
.
Op
t
im
i
zi
n
g
s
ec
u
r
e
o
d
e
r
e
v
i
ew
te
c
h
n
iq
u
es
f
o
r
r
e
al
-
w
o
r
l
d
u
s
e
is
s
t
ill
d
i
f
f
ic
u
l
t,
d
es
p
it
e
p
r
i
o
r
r
ese
ar
c
h
em
p
h
asi
zi
n
g
t
h
e
n
ee
d
o
f
ea
r
l
y
s
ec
u
r
it
y
i
m
p
le
m
en
tati
o
n
a
n
d
o
n
g
o
i
n
g
d
ev
el
o
p
e
r
t
r
a
in
in
g
.
T
h
is
s
tu
d
y
e
x
p
lo
r
es
s
ec
u
r
e
c
o
d
e
r
e
v
i
ew,
e
v
al
u
a
ti
n
g
t
h
ei
r
ef
f
e
cti
v
e
n
ess
a
n
d
s
u
g
g
esti
n
g
im
p
r
o
v
em
en
ts
t
o
e
n
h
a
n
ce
w
eb
ap
p
lic
ati
o
n
s
ec
u
r
it
y
.
B
y
im
p
l
em
e
n
ti
n
g
s
ec
u
r
e
co
d
e
r
e
v
i
ew
p
r
a
cti
ce
s
,
d
e
v
elo
p
er
s
c
an
a
d
o
p
t
b
es
t
s
e
c
u
r
it
y
m
e
as
u
r
es,
s
u
c
h
as
en
f
o
r
ci
n
g
s
ec
u
r
e
a
u
t
h
e
n
ti
ca
t
io
n
m
ec
h
an
is
m
s
,
v
al
id
ati
n
g
u
s
e
r
i
n
p
u
ts
,
a
n
d
m
a
n
ag
in
g
s
ess
i
o
n
s
s
e
cu
r
el
y
,
all
o
f
wh
i
ch
co
n
t
r
i
b
u
te
t
o
s
t
r
e
n
g
t
h
e
n
i
n
g
w
e
b
a
p
p
lic
ati
o
n
s
ec
u
r
it
y
.
C
o
n
d
u
c
ti
n
g
t
h
o
r
o
u
g
h
s
ec
u
r
e
c
o
d
e
r
e
v
ie
ws
is
im
p
o
r
t
an
t
to
k
ee
p
we
b
a
p
p
li
ca
t
io
n
s
s
tr
o
n
g
a
n
d
s
a
f
e
,
esp
ec
iall
y
as
cy
b
er
t
h
r
ea
ts
co
n
t
in
u
e
t
o
e
v
o
l
v
e
[
6
]
.
2.
L
I
T
E
R
AT
U
RE
R
E
VI
E
W
C
o
d
e
r
e
v
i
ew
is
a
n
i
n
t
e
g
r
a
l
p
a
r
t
o
f
s
o
f
t
wa
r
e
d
e
v
e
l
o
p
m
e
n
t
[
7
]
.
T
h
e
d
e
v
e
l
o
p
e
r
s
e
x
a
m
i
n
e
s
o
u
r
c
e
c
o
d
e
i
n
a
s
y
s
te
m
a
t
i
c
a
p
p
r
o
a
c
h
t
o
f
i
n
d
b
u
g
s
,
i
m
p
r
o
v
e
c
o
d
e
q
u
a
l
i
t
y
,
a
n
d
m
a
k
e
s
u
r
e
s
t
a
n
d
a
r
d
s
a
r
e
f
o
l
l
o
w
e
d
.
R
e
v
ie
ws
o
f
t
h
e
c
o
d
e
a
r
e
a
n
es
s
e
n
t
i
al
p
a
r
t
o
f
we
b
s
e
c
u
r
it
y
b
e
c
a
u
s
e
t
h
e
y
k
e
e
p
a
p
p
l
i
c
a
t
i
o
n
s
s
a
f
e
f
r
o
m
t
h
r
e
at
s
a
n
d
h
o
l
e
s
[
8
]
.
W
e
b
a
p
p
l
i
c
a
t
i
o
n
s
a
r
e
e
a
s
y
ta
r
g
e
t
s
f
o
r
h
a
c
k
e
r
s
b
e
c
a
u
s
e
t
h
e
y
h
a
n
d
l
e
a
l
o
t
o
f
p
r
i
v
a
t
e
d
a
t
a
a
n
d
a
r
e
u
s
e
d
b
y
m
a
n
y
p
e
o
p
l
e
.
T
h
e
r
e
f
o
r
e
,
c
o
d
e
r
e
v
i
e
w
s
a
r
e
i
m
p
o
r
t
a
n
t
f
o
r
f
i
n
d
i
n
g
v
u
l
n
e
r
a
b
i
l
i
tie
s
b
e
f
o
r
e
t
h
e
y
h
a
p
p
e
n
[
9
]
.
T
h
e
m
a
i
n
g
o
a
l
o
f
c
o
d
e
r
e
v
i
e
w
s
t
o
f
i
n
d
a
n
d
f
i
x
s
e
c
u
r
i
ty
h
o
l
e
s
b
e
f
o
r
e
t
h
e
c
o
d
e
i
s
d
ep
l
o
y
e
d
.
M
o
r
e
o
v
e
r
,
a
d
o
p
t
i
n
g
a
p
r
o
a
c
t
i
v
e
a
p
p
r
o
a
c
h
h
e
l
p
s
m
it
i
g
a
t
e
r
i
s
k
s
s
u
c
h
a
s
SQ
L
i
n
j
e
ct
i
o
n
,
XS
S
,
C
S
R
F
,
a
n
d
o
t
h
e
r
c
o
m
m
o
n
v
u
l
n
e
r
a
b
i
l
i
ti
es
t
h
a
t
c
o
u
l
d
e
n
a
b
l
e
h
a
c
k
e
r
s
t
o
c
o
m
p
r
o
m
i
s
e
d
at
a
o
r
b
r
e
a
c
h
s
e
c
u
r
i
t
y
[
1
0
]
.
C
o
d
e
r
ev
iews
s
ig
n
if
ican
tly
im
p
r
o
v
e
we
b
ap
p
licatio
n
s
ec
u
r
ity
b
y
e
n
s
u
r
in
g
d
ev
elo
p
er
s
f
o
llo
w
th
e
b
est
p
r
ac
tices
f
o
r
s
ec
u
r
ity
,
s
u
c
h
as
u
s
in
g
s
ec
u
r
e
au
th
e
n
ticatio
n
m
eth
o
d
s
,
v
alid
atin
g
i
n
p
u
t,
an
d
m
an
a
g
in
g
s
ess
io
n
s
s
ec
u
r
ely
[
1
1
]
.
C
o
d
e
r
ev
iews
also
im
p
r
o
v
e
co
d
e
q
u
ality
b
y
en
c
o
u
r
ag
in
g
co
d
e
to
b
e
s
tr
aig
h
tf
o
r
war
d
,
ea
s
y
t
o
u
p
d
ate,
an
d
wo
r
k
well.
Mo
r
eo
v
er
,
it e
n
co
u
r
ag
es tea
m
m
em
b
er
s
with
th
e
d
ev
elo
p
er
to
wo
r
k
to
g
eth
er
an
d
s
h
ar
e
wh
at
th
ey
k
n
o
w,
wh
ich
h
elp
s
ev
er
y
o
n
e
u
n
d
er
s
tan
d
s
ec
u
r
ity
p
r
in
cip
les
an
d
p
r
ac
tices
b
etter
[
1
2
]
.
A
s
tr
u
ctu
r
ed
r
ev
iew
m
eth
o
d
lo
o
k
s
at
all
th
e
co
d
e,
g
iv
es
h
elp
f
u
l
f
ee
d
b
ac
k
o
n
s
ec
u
r
ity
is
s
u
es,
an
d
ch
ec
k
s
th
e
f
ix
es
to
en
s
u
r
e
th
e
p
r
o
b
lem
s
ar
e
f
ix
e
d
co
r
r
ec
tly
.
T
h
e
co
m
p
lex
ity
o
f
c
u
r
r
en
t
we
b
ap
p
licatio
n
s
a
n
d
th
e
co
n
s
tan
tly
ch
an
g
i
n
g
c
y
b
er
th
r
ea
ts
m
a
k
e
it
h
ar
d
to
d
o
ef
f
e
ctiv
e
s
ec
u
r
ity
.
Secu
r
ity
p
r
ac
tices
ea
r
ly
in
th
e
d
ev
elo
p
m
en
t
life
cy
cle
h
elp
to
s
et
th
e
s
tag
e
f
o
r
s
af
e
co
d
e.
Pre
v
io
u
s
s
tu
d
ies
h
av
e
m
o
s
tly
ex
am
in
ed
au
to
m
atic
a
n
d
m
an
u
al
co
d
e
r
ev
iews
in
d
e
p
en
d
en
tly
,
ea
ch
wit
h
u
n
iq
u
e
a
d
v
an
ta
g
es
an
d
lim
ita
tio
n
s
.
B
y
ex
am
in
in
g
b
ig
c
o
d
eb
ases
,
au
to
m
ated
tech
n
o
lo
g
i
es
ef
f
ec
tiv
ely
f
in
d
ty
p
ical
v
u
l
n
er
ab
ilit
ies
lik
e
SQ
L
in
jectio
n
an
d
XSS
[
1
3
]
.
Ne
v
er
th
eless
,
th
ey
f
r
eq
u
en
tly
p
r
o
d
u
ce
f
alse
p
o
s
itiv
es
an
d
m
i
g
h
t
f
ail
to
n
o
tice
c
o
n
te
x
t
-
s
p
ec
if
ic
s
ec
u
r
ity
v
u
ln
e
r
ab
il
ities
.
C
o
n
v
er
s
ely
,
m
an
u
al
r
e
v
i
ews
en
ab
le
s
k
illed
d
ev
elo
p
er
s
to
p
r
o
p
er
l
y
ex
am
in
e
th
e
co
d
e,
id
en
tif
y
in
g
lo
g
ical
er
r
o
r
s
an
d
b
u
s
in
ess
lo
g
ic
wea
k
n
ess
es
th
at
au
to
m
ated
m
eth
o
d
s
co
u
l
d
o
v
e
r
lo
o
k
.
T
h
er
ef
o
r
e,
d
ev
elo
p
e
r
s
m
u
s
t stay
u
p
d
ated
o
n
th
e
lates
t secu
r
ity
th
r
ea
ts
an
d
p
r
o
tectio
n
m
e
asu
r
es
b
y
p
ar
ti
cip
atin
g
in
r
eg
u
lar
t
r
ain
in
g
s
ess
io
n
s
[
1
4
]
.
T
o
o
v
er
c
o
m
e
th
ese
p
r
o
b
lem
s
,
a
m
ix
o
f
au
to
m
ated
to
o
ls
f
o
r
q
u
ick
id
e
n
tific
atio
n
an
d
h
an
d
in
s
p
ec
tio
n
f
o
r
m
o
r
e
in
-
d
e
p
th
an
al
y
s
is
[
1
5
]
.
T
h
u
s
,
th
e
s
tu
d
y
co
n
d
u
cts
a
c
o
m
p
r
e
h
en
s
iv
e
co
d
e
r
ev
iew
an
al
y
s
is
o
f
web
s
ec
u
r
ity
b
y
in
teg
r
atin
g
v
a
r
io
u
s
te
ch
n
iq
u
es,
p
r
o
v
i
d
in
g
a
s
o
lid
f
o
u
n
d
atio
n
f
o
r
web
ap
p
licatio
n
s
ec
u
r
ity
[
1
6
]
.
3.
O
B
J
E
CT
I
V
E
S
T
h
er
e
ar
e
two
m
ain
o
b
jectiv
es to
b
e
ac
h
ie
v
ed
in
t
h
is
s
tu
d
y
.
Her
e
ar
e
th
e
o
b
jectiv
es:
a)
T
o
id
en
tify
th
e
r
is
k
lev
el
a
n
d
c
ateg
o
r
ies f
r
o
m
th
e
s
ec
u
r
e
c
o
d
e
r
ev
iew
af
f
ec
t th
e
lac
k
o
f
s
ec
u
r
ity
b)
T
o
ex
am
in
e
h
o
w
ap
p
licatio
n
c
o
d
e
d
e
v
elo
p
m
e
n
t a
f
f
ec
ts
th
e
r
e
s
is
tan
ce
to
cy
b
er
th
r
ea
ts
4.
M
E
T
H
O
D
T
h
e
s
ec
u
r
e
c
o
d
e
r
ev
iew
p
r
o
ce
s
s
f
o
llo
ws
a
s
tr
u
ctu
r
ed
ap
p
r
o
a
ch
to
e
n
s
u
r
e
a
s
y
s
tem
atic
ev
alu
atio
n
o
f
web
ap
p
licatio
n
s
b
ef
o
r
e
d
ep
l
o
y
m
en
t.
T
h
is
s
tu
d
y
in
v
o
lv
es
a
co
m
b
in
atio
n
o
f
m
an
u
al
an
d
au
to
m
ated
tech
n
iq
u
es
to
id
en
tify
s
ec
u
r
ity
v
u
ln
er
a
b
ilit
ies
ef
f
ec
tiv
ely
.
T
h
e
m
eth
o
d
o
l
o
g
y
c
o
n
s
is
ts
o
f
s
ev
er
al
k
ey
s
t
ag
es,
in
clu
d
in
g
th
e
s
elec
tio
n
o
f
m
u
ltip
le
web
ap
p
licatio
n
s
d
ev
elo
p
ed
b
y
th
e
d
ev
elo
p
er
to
en
s
u
r
e
d
iv
e
r
s
ity
in
c
o
d
eb
ases
an
d
s
ec
u
r
ity
im
p
lem
en
tatio
n
s
.
Ap
p
licatio
n
s
with
d
if
f
er
en
t a
r
c
h
itectu
r
es,
p
r
o
g
r
am
m
in
g
lan
g
u
ag
es,
an
d
f
r
am
ewo
r
k
s
ar
e
in
clu
d
ed
to
en
h
an
ce
th
e
s
tu
d
y
’
s
g
en
er
aliza
b
ilit
y
.
T
h
e
s
ec
u
r
e
co
d
e
r
ev
iew
is
to
id
en
tify
s
ec
u
r
ity
wea
k
n
ess
es
r
esu
ltin
g
f
r
o
m
m
i
s
s
in
g
o
r
in
ad
eq
u
ate
s
ec
u
r
ity
c
o
n
tr
o
ls
,
wh
ich
m
ay
co
m
p
r
o
m
is
e
th
e
ap
p
licatio
n
'
s
r
esis
tan
ce
to
cy
b
er
th
r
ea
ts
[
1
7
]
.
R
a
th
er
th
an
attem
p
tin
g
to
id
en
tify
ev
er
y
p
o
s
s
ib
le
f
law,
th
e
r
ev
iew
p
r
io
r
itizes
th
e
d
etec
tio
n
o
f
k
ey
v
u
ln
er
ab
ilit
ies
th
at
in
d
icate
b
r
o
ad
er
s
ec
u
r
ity
r
is
k
s
.
T
h
e
m
eth
o
d
o
lo
g
y
ad
o
p
ts
a
co
m
p
r
eh
e
n
s
iv
e
class
if
icatio
n
o
f
s
ec
u
r
ity
th
r
e
ats,
wh
ich
h
e
lp
s
in
cr
ea
ti
n
g
a
m
o
r
e
s
y
s
tem
atic
ap
p
r
o
ac
h
to
s
ec
u
r
e
co
d
i
n
g
.
Secu
r
ity
an
aly
s
ts
m
an
u
ally
ex
a
m
in
e
t
h
e
s
o
u
r
ce
co
d
e
to
d
etec
t
s
ec
u
r
ity
f
laws
in
au
th
e
n
ticatio
n
m
ec
h
an
is
m
s
,
d
ata
v
alid
atio
n
,
an
d
s
ess
io
n
m
an
ag
em
en
t
[
1
8
]
.
I
d
en
tifie
d
s
ec
u
r
ity
r
is
k
s
ar
e
d
o
cu
m
e
n
ted
in
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4
7
5
2
C
o
mp
r
eh
en
s
ive
s
ec
u
r
e
co
d
e
r
ev
iew
a
n
a
lysi
s
o
f web
a
p
p
lica
t
io
n
s
ec
u
r
ity
…
(
A
z
lin
d
a
A
b
d
u
l
A
z
iz
)
1809
d
ed
icate
d
s
p
r
ea
d
s
h
ee
ts
,
ca
teg
o
r
ized
b
ased
o
n
s
ev
er
ity
,
a
n
d
ass
ig
n
ed
r
is
k
r
atin
g
s
.
C
o
m
m
o
n
v
u
ln
er
a
b
ilit
ies
ar
e
v
er
if
ied
th
r
o
u
g
h
cr
o
s
s
-
ch
ec
k
in
g
,
wh
ile
less
f
r
eq
u
e
n
t
s
ec
u
r
i
ty
is
s
u
es
u
n
d
er
g
o
g
r
o
u
p
r
e
v
i
ews
f
o
r
v
alid
atio
n
.
T
h
is
p
r
o
ce
s
s
d
ir
ec
tly
s
u
p
p
o
r
ts
th
e
o
b
jectiv
e
o
f
id
en
tif
y
in
g
r
is
k
lev
els an
d
ca
teg
o
r
ies th
at
co
n
tr
ib
u
te
to
th
e
lack
o
f
s
ec
u
r
ity
in
we
b
ap
p
licatio
n
s
.
T
h
e
co
m
b
in
atio
n
o
f
m
an
u
a
l
an
d
au
to
m
ated
tech
n
iq
u
es
en
s
u
r
es
co
m
p
r
eh
en
s
iv
e
v
u
ln
er
ab
ilit
y
d
etec
tio
n
[
1
9
]
.
Ma
n
u
al
r
e
v
iews
h
elp
id
en
tify
lo
g
ic
-
b
ased
s
ec
u
r
ity
is
s
u
es
th
at
au
t
o
m
ated
to
o
ls
m
ig
h
t
o
v
er
lo
o
k
,
wh
ile
au
to
m
ated
to
o
ls
en
h
a
n
c
e
co
v
er
ag
e
a
n
d
ef
f
icien
c
y
.
E
a
ch
id
en
tifie
d
s
ec
u
r
ity
is
s
u
e
is
ass
es
s
ed
b
ased
o
n
p
r
ed
ef
in
e
d
r
is
k
cr
iter
ia,
c
o
n
s
id
er
in
g
f
ac
to
r
s
s
u
c
h
as
ex
p
lo
it
ab
ilit
y
,
im
p
ac
t,
an
d
r
em
ed
iati
o
n
co
m
p
lex
ity
.
R
is
k
r
ep
o
r
ts
i
n
clu
d
e
s
ev
e
r
ity
r
atin
g
s
an
d
r
ec
o
m
m
e
n
d
ed
m
itig
atio
n
s
to
ad
d
r
ess
id
en
tifie
d
is
s
u
es.
B
y
s
y
s
tem
atica
lly
id
en
tify
in
g
an
d
m
itig
atin
g
p
o
ten
tial
s
ec
u
r
ity
v
u
ln
er
a
b
ilit
ies,
th
e
s
ec
u
r
e
co
d
e
r
ev
iew
s
tr
en
g
th
en
s
web
ap
p
licatio
n
s
ec
u
r
ity
[
2
0
]
.
Fu
r
th
er
m
o
r
e
,
it
en
h
an
ce
s
d
e
v
elo
p
er
s
'
awa
r
en
es
s
o
f
s
ec
u
r
ity
is
s
u
es,
co
n
tr
ib
u
tin
g
t
o
th
e
d
ev
elo
p
m
en
t
o
f
m
o
r
e
r
esi
lien
t
ap
p
licatio
n
s
.
Secu
r
ity
r
i
s
k
s
ar
e
g
r
ea
tly
d
ec
r
ea
s
ed
b
y
b
est
p
r
ac
tices
s
u
ch
s
tr
o
n
g
d
ata
v
alid
atio
n
,
s
ec
u
r
e
au
th
en
ticatio
n
,
an
d
ap
p
r
o
p
r
i
ate
s
es
s
io
n
m
an
ag
em
en
t.
E
n
s
u
r
in
g
ad
h
er
en
ce
to
th
ese
p
r
in
cip
les
p
r
o
tects
u
s
er
d
ata
an
d
m
ain
tain
s
th
e
cr
e
d
ib
ilit
y
o
f
web
a
p
p
licatio
n
s
.
Fin
ally
,
th
e
r
ev
iew
d
ir
ec
tly
ad
d
r
ess
es
th
e
o
b
jectiv
es
o
f
th
e
s
tu
d
y
b
y
ev
alu
atin
g
th
e
ef
f
ec
tiv
e
n
ess
o
f
s
ec
u
r
ity
im
p
lem
en
tatio
n
s
in
web
ap
p
licatio
n
s
a
n
d
m
a
k
in
g
a
co
m
p
r
eh
e
n
s
iv
e
class
if
icati
o
n
o
f
s
ec
u
r
ity
th
r
ea
ts
,
wh
ich
h
elp
s
in
cr
ea
tin
g
a
m
o
r
e
s
y
s
tem
atic
ap
p
r
o
ac
h
to
s
ec
u
r
e
co
d
in
g
[
2
1
]
.
T
h
is
ap
p
r
o
ac
h
alig
n
s
with
th
e
s
tu
d
ies
aim
s
to
id
en
tify
v
u
ln
er
ab
ilit
ies
an
d
im
p
r
o
v
in
g
ap
p
licatio
n
s
ec
u
r
ity
r
esil
ien
c
e.
T
h
e
m
eth
o
d
o
lo
g
y
s
tag
e
co
n
s
is
ts
o
f
d
ef
in
in
g
o
b
jectiv
es,
o
u
tlin
in
g
th
e
r
e
v
iew
p
r
o
ce
s
s
,
an
d
a
n
aly
zin
g
t
h
e
s
tu
d
y
o
u
tco
m
es,
as illu
s
tr
ated
in
Fig
u
r
e
1
.
Fig
u
r
e
1
.
Me
th
o
d
o
lo
g
y
s
tag
e
5.
RE
SU
L
T
S AN
D
D
I
SCU
SS
I
O
N
T
h
e
an
aly
s
is
s
tar
ts
b
y
v
iewin
g
th
e
co
d
e
cr
ea
ted
b
y
th
e
d
e
v
elo
p
er
an
d
ex
am
i
n
in
g
th
e
co
d
e'
s
lack
o
f
s
ec
u
r
ity
,
wh
ich
ca
n
c
au
s
e
a
c
y
b
er
t
h
r
ea
t.
T
h
e
a
n
aly
s
is
o
f
th
e
co
d
e
r
is
k
lev
els
is
d
i
v
id
ed
in
to
f
o
u
r
ca
teg
o
r
ies
:
h
ig
h
,
m
e
d
iu
m
,
lo
w,
a
n
d
in
f
o
r
m
atio
n
al,
as
illu
s
tr
ated
in
Fig
u
r
e
2
.
T
h
e
f
in
d
i
n
g
s
s
h
o
w
h
ig
h
r
is
k
co
n
s
is
t
s
o
f
ten
f
in
d
in
g
s
with
th
e
m
o
s
t
p
r
o
m
i
n
en
t
ef
f
ec
t
an
d
n
ee
d
s
q
u
ick
a
tten
tio
n
to
s
to
p
s
ig
n
if
ica
n
t
s
e
cu
r
ity
b
r
ea
ch
es
a
n
d
s
y
s
tem
f
ailu
r
es.
T
h
e
m
ed
i
u
m
r
is
k
s
h
o
wed
n
i
n
e
r
esu
lts
th
a
t
ess
en
tial
p
r
o
b
lem
s
m
u
s
t
b
e
f
ix
ed
im
m
e
d
iately
.
L
o
w
R
is
k
h
as
o
n
e
f
in
d
in
g
t
h
at
p
o
in
t
s
to
m
i
n
o
r
b
u
g
s
in
th
e
c
o
d
e
th
at
n
ee
d
to
b
e
f
i
x
ed
to
k
e
ep
th
e
co
d
e
q
u
ality
h
ig
h
.
T
wo
f
in
d
in
g
s
f
o
r
in
f
o
r
m
atio
n
al
r
esear
ch
ar
e
n
o
t
v
u
ln
er
ab
ilit
ies
b
u
t
h
elp
f
u
l
o
b
s
er
v
atio
n
s
f
o
r
b
est
p
r
ac
tices
id
ea
s
.
Fu
r
th
er
m
o
r
e,
th
is
r
esu
lt
h
elp
s
p
r
io
r
itize
p
r
o
b
lem
f
ix
es,
s
ta
r
tin
g
with
th
e
m
o
s
t
cr
itical
i
s
s
u
es
an
d
m
o
v
in
g
t
o
th
o
s
e
with
lo
w
er
r
is
k
lev
els [
2
2
]
.
Mo
r
eo
v
er
,
Fig
u
r
e
3
s
h
o
ws
th
e
lis
t
o
f
r
is
k
ca
teg
o
r
y
f
in
d
i
n
g
s
an
d
h
i
g
h
lig
h
ts
th
e
m
o
s
t
s
ig
n
if
ican
t
s
ec
u
r
ity
v
u
ln
e
r
ab
ilit
ies
id
en
tif
ied
d
u
r
i
n
g
t
h
e
s
ec
u
r
e
c
o
d
e
r
e
v
iew.
T
h
e
m
o
s
t
co
m
m
o
n
a
r
e
an
d
m
is
s
in
g
in
p
u
t
v
alid
atio
n
,
wh
ich
ar
e
s
h
o
wn
in
s
ev
en
ca
s
es
[
2
3
]
.
T
h
er
ef
o
r
e,
it
s
h
o
ws
th
at
b
ig
g
er
p
r
o
b
l
em
s
m
u
s
t
b
e
f
ix
ed
b
ec
au
s
e
attac
k
er
s
co
u
l
d
ea
s
ily
r
u
n
f
laws
at
an
y
SQL
co
m
m
a
n
d
an
d
tak
e
a
d
v
an
ta
g
e
o
f
th
e
f
ac
t
th
at
in
p
u
t
is
n
o
t
b
ein
g
ap
p
r
o
p
r
iately
ch
ec
k
e
d
,
wh
ich
wo
u
ld
b
e
a
s
ig
n
if
ican
t s
ec
u
r
ity
b
r
ea
c
h
[
2
4
]
.
W
ea
k
p
as
s
wo
r
d
h
an
d
lin
g
an
d
im
p
r
o
p
e
r
s
ess
io
n
m
an
ag
e
m
en
t
wer
e
f
o
u
n
d
two
tim
es,
wh
i
ch
s
h
o
ws
th
at
k
ee
p
in
g
u
s
er
s
ess
io
n
s
an
d
p
r
iv
ate
in
f
o
r
m
atio
n
s
af
e
is
n
o
t
s
tr
o
n
g
en
o
u
g
h
.
W
ea
k
p
ass
wo
r
d
h
a
n
d
lin
g
,
in
s
ec
u
r
e
d
ir
ec
t o
b
ject
r
e
f
er
en
ce
,
in
f
o
r
m
atio
n
ex
p
o
s
u
r
e,
d
ep
r
ec
ate
d
f
u
n
ctio
n
s
,
an
d
lack
o
f
co
m
m
e
n
ts
ar
e
s
o
m
e
less
co
m
m
o
n
b
u
t
s
till
im
p
o
r
tan
t
r
esu
lts
.
Alth
o
u
g
h
th
ese
p
r
o
b
le
m
s
ar
e
l
ess
f
r
eq
u
en
t,
th
e
y
s
till
p
o
s
e
s
ig
n
if
ican
t r
is
k
s
th
at
m
u
s
t b
e
ad
d
r
ess
ed
[
2
5
]
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
5
2
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
,
Vo
l.
3
9
,
No
.
3
,
Sep
tem
b
er
20
25
:
1
8
0
7
-
1
8
1
4
1810
Fig
u
r
e
2
.
R
is
k
lev
el
f
in
d
in
g
Fig
u
r
e
3
.
L
is
t
r
is
k
ca
teg
o
r
ies
Mo
r
eo
v
er
,
th
e
ap
p
licatio
n
co
d
es
wer
e
an
aly
ze
d
b
y
t
h
e
s
ec
u
r
e
co
d
e
r
ev
iewe
r
,
an
d
th
e
wea
k
s
ec
u
r
ity
o
f
th
e
ap
p
licatio
n
co
d
e
d
ev
el
o
p
m
en
t
was
d
ef
in
ed
.
B
ased
o
n
th
e
an
aly
s
is
,
th
e
h
ig
h
er
r
is
k
co
d
e
ca
teg
o
r
ies
o
f
r
esis
tan
ce
ef
f
ec
ts
ar
e
s
h
o
wn
i
n
T
ab
le
1
.
T
h
e
s
tu
d
y
r
ev
ea
le
d
SQL
in
jectio
n
is
th
e
wea
k
n
ess
o
f
th
e
s
o
f
twar
e,
wh
ich
co
n
s
tr
u
cts
SQL
co
m
m
an
d
s
u
s
in
g
ex
ter
n
ally
in
f
lu
e
n
ce
d
in
p
u
t
with
o
u
t
p
r
o
p
er
n
e
u
t
r
aliza
tio
n
o
f
u
n
iq
u
e
elem
en
ts
th
at
co
u
ld
m
o
d
if
y
th
e
in
ten
d
ed
SQL
co
m
m
a
n
d
.
Mo
r
eo
v
er
,
wea
k
p
ass
wo
r
d
h
an
d
lin
g
m
u
s
t
b
e
s
tr
ess
ed
to
av
o
id
cr
y
p
to
g
r
ap
h
ic
f
ailu
r
es
f
o
r
p
lain
tex
t
p
ass
wo
r
d
s
to
r
ag
e.
T
h
e
wea
k
n
ess
is
th
at
th
e
s
o
f
twar
e
s
to
r
es sen
s
itiv
e
d
ata,
s
u
ch
as p
ass
wo
r
d
s
,
u
s
in
g
a
r
ev
er
s
ib
le
e
n
co
d
in
g
r
ath
er
th
an
a
o
n
e
-
way
h
ash
[2
5
].
Fu
r
th
er
m
o
r
e
,
in
in
s
ec
u
r
e
d
ir
e
ct
o
b
ject
r
e
f
er
en
ce
,
b
r
o
k
en
a
cc
ess
co
n
tr
o
l
o
cc
u
r
s
in
b
r
o
k
en
ac
ce
s
s
co
n
tr
o
l,
wh
ich
is
au
th
o
r
izatio
n
b
y
p
ass
th
r
o
u
g
h
a
u
s
er
-
co
n
tr
o
lled
k
e
y
.
T
h
e
wea
k
n
ess
o
f
th
e
ap
p
licatio
n
is
th
at
it
d
o
es
n
o
t
co
r
r
ec
tly
v
er
if
y
if
a
u
s
er
is
au
th
o
r
ized
t
o
a
cc
ess
th
e
r
eso
u
r
ce
it
is
r
eq
u
esti
n
g
.
Mo
r
eo
v
er
,
in
f
o
r
m
atio
n
ex
p
o
s
u
r
e
af
f
ec
ts
s
en
s
itiv
e
d
ata
ex
p
o
s
u
r
e
f
o
r
in
f
o
r
m
atio
n
e
x
p
o
s
u
r
e.
T
h
e
wea
k
n
ess
is
th
e
s
o
f
twar
e
d
o
es n
o
t a
d
e
q
u
ately
p
r
o
tect
s
e
n
s
itiv
e
d
ata
f
r
o
m
u
n
au
t
h
o
r
ized
ac
ce
s
s
d
u
r
in
g
its
life
tim
e.
Mo
r
eo
v
er
,
T
ab
le
2
s
h
o
ws
th
e
an
aly
s
is
r
esu
lt
o
f
t
h
e
r
esis
tan
ce
ef
f
ec
ts
o
f
th
e
m
ed
iu
m
-
r
is
k
co
d
e
ca
teg
o
r
ies,
wh
ich
co
n
s
is
t
o
f
im
p
r
o
p
er
s
ess
io
n
m
a
n
ag
em
en
t
an
d
m
is
s
in
g
in
p
u
t
v
alid
a
tio
n
.
T
h
e
im
p
r
o
p
er
s
ess
io
n
m
an
ag
em
en
t
in
cr
y
p
to
g
r
ap
h
ic
f
ail
u
r
es
s
h
o
ws
th
e
wea
k
n
ess
in
p
lain
tex
t
s
to
r
ag
e
o
f
a
p
ass
wo
r
d
wh
er
e
th
e
s
o
f
twar
e
s
to
r
es
s
en
s
itiv
e
d
ata
s
u
ch
as
p
ass
wo
r
d
s
u
s
in
g
r
ev
er
s
ib
le
e
n
co
d
in
g
r
at
h
er
th
an
a
o
n
e
-
way
h
ash
.
Mo
r
eo
v
er
,
m
is
s
in
g
in
p
u
t
v
alid
atio
n
s
h
o
ws
th
at
th
e
c
o
d
e
cr
ea
ted
is
n
o
t
an
im
p
r
o
p
er
in
p
u
t
v
alid
atio
n
wh
er
e
th
e
wea
k
n
ess
o
f
th
e
s
o
f
twar
e
d
o
es
n
o
t
p
r
o
p
er
ly
v
alid
ate
in
p
u
ts
,
wh
ich
ca
n
af
f
ec
t
an
d
co
n
t
r
o
l
th
e
f
lo
w
o
f
th
e
p
r
o
g
r
a
m
.
Mo
r
eo
v
er
,
T
a
b
le
3
s
h
o
ws
th
e
r
esis
tan
ce
ef
f
ec
ts
o
f
th
e
in
f
o
r
m
atio
n
al
co
d
e
ca
teg
o
r
ies,
wh
i
ch
co
n
s
is
t
o
f
d
e
p
r
ec
ated
ca
u
s
ed
b
y
th
e
s
ec
u
r
ity
lo
g
g
in
g
an
d
m
o
n
ito
r
in
g
f
ailu
r
es,
wh
ich
ar
e
t
h
e
ef
f
ec
t
o
f
p
o
te
n
tially
d
an
g
er
o
u
s
f
u
n
ctio
n
s
wh
e
r
e
th
e
ap
p
licatio
n
u
s
es
d
ep
r
ec
ated
f
u
n
ctio
n
s
th
at
o
f
d
e
p
r
ec
ated
f
u
n
ctio
n
s
an
d
a
lack
o
f
co
m
m
en
ts
.
Fro
m
th
e
an
a
ly
s
is
s
h
o
wn
th
e
d
ep
r
ec
at
ed
f
u
n
ctio
n
s
a
r
e
ca
u
s
ed
b
y
s
ec
u
r
ity
lo
g
g
in
g
an
d
m
o
n
ito
r
in
g
f
ailu
r
es,
wh
ich
a
r
e
th
e
e
f
f
ec
t
o
f
p
o
ten
tially
d
an
g
er
o
u
s
f
u
n
ctio
n
s
w
h
er
e
t
h
e
ap
p
licatio
n
u
s
es
d
ep
r
ec
ated
task
s
th
at
m
ig
h
t
n
o
t
b
e
s
u
p
p
o
r
ted
i
n
f
u
t
u
r
e
p
r
o
g
r
am
m
in
g
lan
g
u
ag
e
v
er
s
io
n
s
a
n
d
m
ay
h
av
e
k
n
o
w
n
v
u
ln
er
ab
ilit
ies
[
1
5
]
.
Fu
r
th
er
m
o
r
e,
th
e
lack
o
f
c
o
m
m
en
ts
af
f
ec
ts
th
e
s
ec
u
r
ity
lo
g
g
in
g
an
d
m
o
n
ito
r
in
g
f
ailu
r
es
f
o
r
s
u
s
p
icio
u
s
co
m
m
en
ts
.
I
t
i
n
v
o
lv
es
th
e
ap
p
licatio
n
'
s
lack
o
f
co
m
m
en
ts
ex
p
lain
i
n
g
co
m
p
lex
co
d
e
s
ec
tio
n
s
,
wh
ich
ca
n
lead
t
o
d
if
f
ic
u
lties
in
m
ain
ten
an
ce
an
d
d
eb
u
g
g
in
g
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4
7
5
2
C
o
mp
r
eh
en
s
ive
s
ec
u
r
e
co
d
e
r
ev
iew
a
n
a
lysi
s
o
f web
a
p
p
lica
t
io
n
s
ec
u
r
ity
…
(
A
z
lin
d
a
A
b
d
u
l
A
z
iz
)
1811
T
ab
le
1
.
Hig
h
-
r
is
k
co
d
e
ca
teg
o
r
ies r
esis
tan
ce
ef
f
ec
t
C
a
t
e
g
o
r
i
e
s
A
p
p
l
i
c
a
t
i
o
n
c
o
d
e
D
e
scri
p
t
i
o
n
R
i
s
k
S
Q
L
i
n
j
e
c
t
i
o
n
$
sq
l
=
“
I
N
S
ERT I
N
T
O
‘
t
ra
n
sa
c
t
i
o
n
”
(
i
t
e
m
’
,
’
a
m
o
u
n
t
’
,
‘
t
y
p
e
’
,
‘
e
m
a
i
l
’
,
‘
d
a
t
e
’
)
VALU
E
S
(‘$
i
t
e
m
’
,
’
$
a
m
o
u
n
t
’
,
’
$
t
y
p
e
’
,
’
t
e
m
p
’
,
’
$
d
a
t
e
”
)
”
;
U
ser i
n
p
u
t
v
a
r
i
a
b
l
e
s
a
r
e
d
i
r
e
c
t
l
y
c
o
n
c
a
t
e
n
a
t
e
d
i
n
t
o
t
h
e
S
Q
L
q
u
e
r
y
w
i
t
h
o
u
t
p
r
o
p
e
r
sa
n
i
t
i
z
a
t
i
o
n
o
r
u
s
e
o
f
p
r
e
p
a
r
e
d
s
t
a
t
e
m
e
n
t
H
i
g
h
W
e
e
k
p
a
ssw
o
r
d
h
a
n
d
l
i
n
g
$
sq
l
=
“
U
PD
ATE ‘
u
ser’
S
ET
‘
p
a
ss
w
o
r
d
’
=
’
$
p
a
ssw
o
r
d
’
WHE
RE
‘
e
m
a
i
l
’
=
‘
$
i
d
”
Th
e
n
e
w
p
a
ssw
o
r
d
i
s s
t
o
r
e
d
i
n
p
l
a
i
n
t
e
x
t
i
n
t
h
e
d
a
t
a
b
a
s
e
H
i
g
h
I
n
sec
u
r
e
d
i
r
e
c
t
o
b
j
e
c
t
r
e
f
e
r
e
n
c
e
$
d
=
$
_
G
ET(
‘
i
d
’
)
$
sq
l
=
“
D
ELET
E
FRO
M
‘
t
ra
n
s
a
c
t
i
o
n
WHERE
i
d
=
“
$
i
d
”
;
Th
e
t
r
a
n
sa
c
t
i
o
n
I
D
f
r
o
m t
h
e
U
R
L
p
a
r
a
m
e
t
e
r
i
s
u
s
e
d
d
i
r
e
c
t
l
y
i
n
a
n
S
Q
L
D
ELET
E
q
u
e
r
y
w
i
t
h
o
u
t
v
e
r
i
f
y
i
n
g
u
ser
p
e
r
m
i
ssi
o
n
s
H
i
g
h
I
n
f
o
r
mat
i
o
n
e
x
p
o
s
u
r
e
i
f
(
$
ro
w
=
=
1
)
{
$
_
S
E
S
S
I
O
N
[‘
sess’
}
=
$
e
m
a
i
l
;
$
_
S
E
S
S
I
O
N
[‘
n
o
t
i
f
y
’
]
=
‘
1
’
;
h
e
a
d
e
r
(
“
l
o
c
a
t
i
o
n
:
.
/
.
/
d
a
s
h
b
o
a
rd
.
p
h
p
”
)
;
)
e
l
se
(
$
_
S
E
S
S
I
O
N
[‘
n
o
t
i
f
y
’
] =
‘
2
’
;
h
e
a
d
e
r
(
“
l
o
c
a
t
i
o
n
:
.
/
.
/
l
o
g
i
n
.
p
h
p
”
)
;
}
Er
r
o
r
mess
a
g
e
s re
v
e
a
l
se
n
si
t
i
v
e
i
n
f
o
r
mat
i
o
n
H
i
g
h
T
ab
le
2
.
Me
d
i
u
m
-
r
is
k
co
d
e
ca
teg
o
r
ies r
esis
tan
ce
ef
f
ec
ts
C
a
t
e
g
o
r
i
e
s
A
p
p
l
i
c
a
t
i
o
n
c
o
d
e
D
e
scri
p
t
i
o
n
R
i
s
k
I
mp
r
o
p
e
r
s
e
ssi
o
n
man
a
g
e
me
n
t
S
E
S
S
I
O
N
_
S
T
ART(
)
;
Th
e
sess
i
o
n
i
s s
t
a
r
t
e
d
w
i
t
h
o
u
t
r
e
g
e
n
e
r
a
t
i
n
g
t
h
e
s
e
ssi
o
n
I
D
u
p
o
n
su
c
c
e
ssf
u
l
l
o
g
i
n
M
e
d
i
u
m
M
i
ss
i
n
g
i
n
p
u
t
v
a
l
i
d
a
t
i
o
n
$
t
y
p
e
=
$
_
PO
S
T
[“
t
y
p
e
’
];
$
i
t
e
m
=
$
_
PO
S
T
[‘
i
t
e
m
’
]
$
a
m
o
u
n
t
=
$
_
PO
S
T
[‘
a
m
o
u
n
t
’
]
Th
e
sess
i
o
n
i
s s
t
a
r
t
e
d
w
i
t
h
o
u
t
r
e
g
e
n
e
r
a
t
i
n
g
t
h
e
s
e
ssi
o
n
I
D
u
p
o
n
su
c
c
e
ssf
u
l
l
o
g
i
n
M
e
d
i
u
m
T
ab
le
3
.
I
n
f
o
r
m
atio
n
al
r
is
k
c
o
d
e
ca
teg
o
r
ies r
esis
tan
ce
ef
f
ec
t
s
C
a
t
e
g
o
r
i
e
s
A
p
p
l
i
c
a
t
i
o
n
c
o
d
e
D
e
scri
p
t
i
o
n
R
i
s
k
D
e
p
r
e
c
a
t
e
d
f
u
n
c
t
i
o
n
s
$
c
o
n
n
=
m
y
sq
l
_
c
o
n
n
e
c
t
(
‘
l
o
c
a
l
h
o
s
t
’
,
‘
ro
o
t
’
,
”
,
’
m
t
’
)
;
Th
e
my
sq
l
_
c
o
n
n
e
c
t
f
u
n
c
t
i
o
n
i
s
d
e
p
r
e
c
a
t
e
d
I
n
f
o
r
mat
i
o
n
a
l
La
c
k
o
f
c
o
mm
e
n
t
$
sq
l
=
”
U
PD
AT
E
‘
u
s
e
r’
S
ET ‘
n
a
m
e
’
=
“
$
n
a
m
e
”
,
‘
e
m
a
i
l
’
=
‘
$
e
m
a
i
l
WHER
E
‘
e
m
a
i
l
’
=
‘
$
t
e
e
m
p
”
,
i
f
(
$
c
o
n
n
-
>
q
u
e
ry
(
$
s
q
l
)
=
=
=
T
RU
E)
;
Th
e
c
o
d
e
p
e
r
f
o
r
ms
a
seri
e
s
o
f
o
p
e
r
a
t
i
o
n
s
w
i
t
h
o
u
t
a
n
y
c
o
m
me
n
t
s
e
x
p
l
a
i
n
i
n
g
t
h
e
l
o
g
i
c
I
n
f
o
r
mat
i
o
n
a
l
T
h
e
f
in
d
in
g
s
o
f
th
is
s
tu
d
y
h
ig
h
lig
h
t
th
e
cr
itical
im
p
o
r
tan
ce
o
f
s
ec
u
r
e
co
d
in
g
p
r
ac
tices
in
m
itig
atin
g
s
ec
u
r
ity
v
u
ln
e
r
ab
ilit
ies
b
ef
o
r
e
d
ep
lo
y
m
en
t.
T
h
e
a
n
aly
s
is
co
n
f
ir
m
s
th
at
p
r
o
p
er
i
n
p
u
t
v
al
id
atio
n
,
th
e
u
s
e
o
f
s
tr
u
ctu
r
ed
SQL
q
u
e
r
ies,
p
ass
wo
r
d
h
ash
in
g
,
s
ess
i
o
n
I
D
r
eg
en
er
atio
n
,
an
d
co
n
tin
u
o
u
s
co
d
e
u
p
d
ates
ar
e
ess
en
tial
in
p
r
ev
en
tin
g
s
ec
u
r
it
y
th
r
ea
ts
.
A
k
ey
f
in
d
in
g
is
th
a
t
s
tr
ict
in
p
u
t
v
alid
atio
n
ef
f
ec
ti
v
ely
p
r
ev
en
ts
XSS
an
d
SQL
in
jectio
n
attac
k
s
,
r
ein
f
o
r
cin
g
th
e
n
ec
ess
ity
o
f
im
p
l
em
en
tin
g
p
r
e
p
ar
ed
s
tatem
en
ts
to
en
s
u
r
e
u
s
er
in
p
u
t
is
tr
ea
ted
as
d
ata
r
ath
er
th
an
p
ar
t
o
f
SQL
co
m
m
an
d
s
[
1
9
]
.
Ad
d
itio
n
ally
,
th
e
s
tu
d
y
u
n
d
er
s
co
r
es
th
at
ad
d
in
g
a
u
n
iq
u
e
s
alt
to
p
ass
wo
r
d
s
b
ef
o
r
e
h
ash
in
g
en
h
a
n
ce
s
s
ec
u
r
ity
,
en
s
u
r
in
g
th
at
ev
en
if
a
h
ash
is
co
m
p
r
o
m
is
ed
,
th
e
o
r
ig
in
al
p
ass
wo
r
d
r
em
ain
s
p
r
o
tecte
d
.
T
h
ese
f
in
d
i
n
g
s
a
lig
n
with
well
-
estab
lis
h
ed
s
ec
u
r
ity
g
u
id
elin
es,
d
em
o
n
s
tr
atin
g
t
h
at
ad
h
er
i
n
g
to
b
est co
d
in
g
p
r
ac
tices si
g
n
if
ican
tly
r
ed
u
ce
s
s
ec
u
r
ity
r
is
k
s
in
web
ap
p
licatio
n
s
.
I
n
co
n
tr
ast
to
ea
r
lier
s
tu
d
ies,
wh
ich
f
r
e
q
u
en
tly
o
f
f
er
s
b
r
o
a
d
s
ec
u
r
ity
a
d
v
ice,
th
is
s
tu
d
y
p
r
o
v
id
es
a
s
y
s
tem
atic
an
d
ca
teg
o
r
ized
w
ay
to
f
in
d
a
n
d
class
if
y
v
u
ln
er
ab
ilit
ies
ac
co
r
d
in
g
to
th
eir
r
el
ev
an
ce
.
T
h
is
allo
ws
d
ev
elo
p
er
s
to
e
f
f
ec
tiv
ely
all
o
ca
te
r
eso
u
r
ce
s
to
war
d
t
h
e
m
o
s
t
cr
itical
s
ec
u
r
ity
r
is
k
s
.
On
e
o
f
th
e
s
tu
d
y
’
s
s
tr
en
g
th
s
is
its
co
m
p
r
eh
en
s
iv
e
class
if
icatio
n
o
f
s
ec
u
r
ity
th
r
ea
ts
,
wh
ich
h
elp
s
in
cr
ea
tin
g
a
m
o
r
e
s
y
s
tem
atic
ap
p
r
o
ac
h
to
s
ec
u
r
e
co
d
in
g
.
Ho
wev
er
,
a
n
o
tab
le
lim
it
atio
n
is
its
r
elian
ce
o
n
s
t
atic
co
d
e
an
aly
s
is
,
wh
ich
m
ay
o
v
er
lo
o
k
r
u
n
tim
e
v
u
ln
er
a
b
ilit
ies
an
d
em
er
g
i
n
g
th
r
ea
ts
[
2
2
]
.
T
h
e
r
esu
lts
also
s
h
o
w
th
at
p
o
o
r
s
ess
io
n
m
an
ag
em
en
t
an
d
in
a
d
eq
u
ate
p
ass
wo
r
d
h
an
d
lin
g
a
r
e
m
o
r
e
c
o
m
m
o
n
th
a
n
e
x
p
ec
ted
,
in
d
icatin
g
t
h
at
ev
en
b
asic
s
ec
u
r
ity
p
r
ec
au
tio
n
s
ar
e
f
r
e
q
u
en
tly
d
is
r
eg
ar
d
e
d
in
p
r
ac
tical
a
p
p
licatio
n
s
.
Fu
r
th
er
m
o
r
e
,
d
esp
ite
c
u
r
r
en
t d
e
v
elo
p
m
e
n
t n
o
r
m
s
r
estrictin
g
s
u
ch
p
r
ac
tices,
th
e
co
n
tin
u
ed
u
s
e
o
f
o
b
s
o
lete
f
u
n
cti
o
n
s
an
d
th
e
ab
s
en
c
e
o
f
ad
e
q
u
ate
co
d
e
d
o
cu
m
en
tati
o
n
p
o
in
t
to
o
n
g
o
in
g
s
ec
u
r
ity
o
v
er
s
ig
h
ts
.
T
h
ese
u
n
e
x
p
ec
ted
r
esu
lts
h
ig
h
lig
h
t
th
e
n
ee
d
f
o
r
g
r
ea
ter
awa
r
en
e
s
s
an
d
en
f
o
r
ce
m
en
t
o
f
s
ec
u
r
ity
b
est
p
r
ac
tices
am
o
n
g
d
e
v
elo
p
e
r
s
.
B
y
in
teg
r
atin
g
b
o
th
au
to
m
ated
an
d
m
an
u
al
r
e
v
iew
tech
n
iq
u
es,
th
is
s
tu
d
y
en
h
an
ce
s
th
e
ac
cu
r
ac
y
an
d
ef
f
icien
cy
o
f
s
ec
u
r
e
co
d
e
a
n
a
ly
s
is
.
Au
to
m
ated
to
o
ls
allo
w
f
o
r
q
u
ic
k
d
etec
tio
n
o
f
co
m
m
o
n
v
u
ln
er
a
b
ilit
ies,
wh
il
e
m
an
u
al
r
ev
iews p
r
o
v
i
d
e
d
ee
p
e
r
in
s
ig
h
t
in
to
lo
g
ic
-
b
ased
s
ec
u
r
ity
f
laws
[
2
5
]
.
T
h
is
c
o
m
b
in
atio
n
en
s
u
r
es
a
m
o
r
e
co
m
p
r
e
h
en
s
iv
e
ap
p
r
o
a
ch
to
s
ec
u
r
in
g
web
ap
p
lic
atio
n
s
,
r
ein
f
o
r
cin
g
b
est
co
d
in
g
p
r
ac
tices
an
d
s
tr
en
g
th
en
in
g
cy
b
er
s
ec
u
r
ity
d
e
f
en
s
es.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
5
2
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
,
Vo
l.
3
9
,
No
.
3
,
Sep
tem
b
er
20
25
:
1
8
0
7
-
1
8
1
4
1812
T
h
is
s
tu
d
y
s
u
cc
es
s
f
u
lly
ac
h
iev
es
its
g
o
al
o
f
em
p
h
asizin
g
t
h
e
im
p
o
r
tan
ce
o
f
s
ec
u
r
e
co
d
e
r
ev
iews
in
r
ed
u
cin
g
c
y
b
er
s
ec
u
r
it
y
r
is
k
s
an
d
s
tr
en
g
th
en
i
n
g
web
ap
p
licatio
n
s
ec
u
r
ity
.
I
t
p
r
o
v
id
es
an
ef
f
ec
tiv
e
s
tr
u
ctu
r
e
f
o
r
d
ev
elo
p
er
s
,
o
r
g
a
n
izatio
n
s
,
an
d
cy
b
er
s
ec
u
r
it
y
ex
p
er
ts
to
e
n
h
a
n
ce
th
eir
s
ec
u
r
ity
s
tr
ateg
ies
th
r
o
u
g
h
p
r
o
p
er
in
p
u
t
v
alid
atio
n
,
s
ec
u
r
e
s
ess
io
n
m
an
ag
em
en
t,
an
d
s
tr
o
n
g
a
u
th
en
ti
ca
tio
n
m
ec
h
a
n
is
m
s
.
T
o
en
h
an
ce
th
e
ef
f
ec
tiv
e
n
ess
an
d
p
r
ec
is
io
n
o
f
s
ec
u
r
e
co
d
e
r
ev
iews,
f
u
tu
r
e
en
h
an
ce
m
en
t
n
ee
d
ex
p
lo
r
es
ar
tific
ial
i
n
tellig
en
ce
(
AI
)
-
en
h
a
n
ce
d
to
o
ls
an
d
d
y
n
a
m
ic
s
ec
u
r
ity
test
in
g
ap
p
r
o
ac
h
es.
B
y
co
n
tin
u
o
u
s
ly
r
ef
in
in
g
s
ec
u
r
ity
tech
n
iq
u
e
s
,
th
e
in
d
u
s
tr
y
ca
n
s
tay
ah
ea
d
o
f
ev
o
lv
i
n
g
cy
b
er
t
h
r
ea
ts
an
d
en
s
u
r
e
th
e
lo
n
g
-
ter
m
s
ec
u
r
ity
an
d
r
esil
ien
ce
o
f
w
eb
ap
p
licatio
n
s
.
6.
CO
NCLU
SI
O
N
I
n
co
n
clu
s
io
n
,
ca
r
e
f
u
lly
r
ea
d
i
n
g
an
d
lo
o
k
in
g
o
v
er
th
e
ap
p
licatio
n
co
d
e
d
ev
elo
p
ed
b
y
th
e
d
ev
elo
p
e
r
b
y
h
an
d
d
u
r
in
g
th
e
r
ev
iew
is
ess
en
tial.
T
h
e
s
ec
u
r
e
co
d
e
r
ev
iew
r
ev
ea
led
s
ev
er
al
s
ec
u
r
ity
h
o
les
r
eq
u
ir
in
g
im
m
ed
iate
atten
tio
n
to
im
p
r
o
v
e
s
ec
u
r
ity
an
d
co
d
e
q
u
ality
.
I
d
en
tify
in
g
an
d
ad
d
r
ess
in
g
th
ese
v
u
ln
er
ab
ilit
ies
at
an
ea
r
ly
s
tag
e
h
elp
s
p
r
ev
en
t
p
o
ten
tial
cy
b
er
t
h
r
ea
ts
th
at
co
u
ld
ex
p
lo
it
wea
k
n
ess
es
in
th
e
s
y
s
tem
.
Usi
n
g
th
e
an
aly
s
is
r
eq
u
ir
es
im
m
ed
iate
atten
tio
n
to
im
p
r
o
v
e.
Fro
m
th
at,
co
d
e
q
u
ality
ca
n
en
h
an
c
e
b
y
en
co
u
r
ag
i
n
g
s
tr
aig
h
tf
o
r
war
d
,
ea
s
y
-
to
-
u
p
d
at
e,
an
d
well
-
f
u
n
ctio
n
in
g
co
d
e.
C
o
n
s
eq
u
en
tly
,
th
e
d
ev
el
o
p
er
n
ee
d
s
to
r
ev
iew
all
th
e
co
d
e
an
d
s
ec
u
r
ity
m
eth
o
d
s
to
en
s
u
r
e
th
e
s
ec
u
r
ity
p
r
o
b
le
m
s
ar
e
f
ix
e
d
c
o
r
r
ec
tly
.
B
y
in
t
eg
r
atin
g
a
u
to
m
ated
to
o
ls
alo
n
g
s
id
e
m
a
n
u
al
r
e
v
ie
ws,
d
ev
elo
p
er
s
ca
n
en
h
an
ce
a
cc
u
r
ac
y
a
n
d
e
f
f
icien
cy
in
d
ete
ctin
g
s
ec
u
r
ity
f
laws,
lead
in
g
to
m
o
r
e
s
ec
u
r
e
an
d
r
e
s
ilien
t
ap
p
licatio
n
s
.
A
s
tr
o
n
g
s
ec
u
r
e
co
d
in
g
c
u
ltu
r
e
with
in
d
ev
elo
p
m
e
n
t
team
s
en
s
u
r
es
lo
n
g
-
ter
m
s
ec
u
r
ity
b
en
ef
its
an
d
ad
o
p
ts
ac
co
u
n
tab
ilit
y
am
o
n
g
d
e
v
elo
p
er
s
.
T
h
er
ef
o
r
e,
s
ec
u
r
e
c
o
d
e
r
ev
iews
ar
e
v
e
r
y
im
p
o
r
tan
t
f
o
r
k
ee
p
i
n
g
u
s
er
s
'
tr
u
s
t
an
d
p
r
o
tectin
g
p
r
i
v
ate
d
ata
b
ec
au
s
e
th
ey
f
in
d
b
u
g
s
b
ef
o
r
e
th
ey
h
ap
p
e
n
,
f
o
llo
w
b
est
p
r
ac
tices,
an
d
en
co
u
r
ag
e
a
cu
ltu
r
e
o
f
co
n
s
tan
t
im
p
r
o
v
em
en
t.
T
h
u
s
,
d
ev
elo
p
er
s
ca
n
m
ak
e
th
eir
web
ap
p
licatio
n
s
m
u
ch
s
af
er
b
y
f
o
llo
win
g
th
ese
r
u
les.
T
h
ese
r
u
les
will
p
r
o
tect
ag
ain
s
t
s
tan
d
ar
d
s
ec
u
r
ity
h
o
les
a
n
d
g
iv
e
d
ev
elo
p
er
s
a
s
tr
o
n
g
d
ef
en
s
e
ag
ai
n
s
t
th
r
ea
ts
.
Ad
d
itio
n
ally
,
o
r
g
an
izat
io
n
s
s
h
o
u
ld
in
v
est
in
r
eg
u
lar
s
ec
u
r
ity
tr
ai
n
in
g
p
r
o
g
r
a
m
s
to
k
ee
p
d
e
v
elo
p
er
s
u
p
d
ate
d
o
n
t
h
e
latest
th
r
e
ats
an
d
p
r
o
tectio
n
s
tr
ateg
ies.
L
astl
y
,
co
n
tin
u
o
u
s
m
o
n
ito
r
in
g
,
r
eg
u
la
r
u
p
d
ates,
a
n
d
th
o
r
o
u
g
h
test
in
g
ar
e
n
ec
ess
ar
y
to
m
ain
tain
th
e
s
ec
u
r
ity
an
d
in
teg
r
ity
o
f
a
n
a
p
p
licatio
n
in
th
e
lo
n
g
ter
m
.
A
p
r
o
ac
tiv
e
ap
p
r
o
ac
h
to
s
ec
u
r
it
y
n
o
t
o
n
ly
p
r
o
te
cts
ap
p
licatio
n
s
f
r
o
m
cy
b
er
attac
k
s
b
u
t
also
s
tr
en
g
th
en
s
th
e
o
v
er
all
d
ig
ital
ec
o
s
y
s
tem
b
y
r
ed
u
cin
g
s
ec
u
r
ity
r
is
k
s
at
a
lar
g
er
s
ca
le.
ACK
NO
WL
E
DG
E
M
E
NT
S
T
h
e
ap
p
r
ec
iatio
n
f
o
r
th
e
tea
m
m
em
b
e
r
th
at
h
as
co
llab
o
r
a
tio
n
in
c
o
m
p
leted
f
o
r
th
is
r
e
s
ea
r
ch
an
d
co
n
tr
ib
u
te
th
r
o
u
g
h
o
u
t
th
e
p
r
o
ce
s
s
o
f
wr
itin
g
p
ap
er
.
T
h
eir
ex
p
er
tis
e
an
d
s
u
p
p
o
r
t
h
a
v
e
g
r
ea
tly
en
h
an
ce
d
t
h
e
q
u
ality
o
f
t
h
is
wo
r
k
.
F
UNDING
I
NF
O
R
M
A
T
I
O
N
T
h
is
r
esear
ch
was c
o
n
d
u
cte
d
i
n
d
ep
en
d
en
tly
b
y
th
e
a
u
th
o
r
s
w
ith
o
u
t a
n
y
ex
ter
n
al
f
in
an
cial
s
u
p
p
o
r
t.
AUTHO
R
CO
NT
RI
B
UT
I
O
NS ST
A
T
E
M
E
N
T
All a
u
th
o
r
s
co
n
tr
ib
u
ted
m
ea
n
i
n
g
f
u
lly
to
th
e
c
o
n
ce
p
tio
n
,
d
esig
n
,
ex
ec
u
tio
n
,
an
d
a
n
aly
s
is
o
f
th
is
s
tu
d
y
,
as d
escr
ib
ed
in
th
e
f
o
llo
win
g
t
ab
le:
Na
m
e
o
f
Aut
ho
r
C
M
So
Va
Fo
I
R
D
O
E
Vi
Su
P
Fu
Azlin
d
a
Ab
d
u
l A
ziz
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
Nu
r
R
az
ia
Mo
h
d
Su
r
ad
i
✓
✓
✓
✓
✓
✓
R
ah
ay
u
Han
d
an
✓
✓
✓
✓
✓
Mo
h
d
No
o
r
R
izal
Ar
b
ain
✓
✓
✓
✓
C
:
C
o
n
c
e
p
t
u
a
l
i
z
a
t
i
o
n
M
:
M
e
t
h
o
d
o
l
o
g
y
So
:
So
f
t
w
a
r
e
Va
:
Va
l
i
d
a
t
i
o
n
Fo
:
Fo
r
mal
a
n
a
l
y
s
i
s
I
:
I
n
v
e
s
t
i
g
a
t
i
o
n
R
:
R
e
so
u
r
c
e
s
D
:
D
a
t
a
C
u
r
a
t
i
o
n
O
:
W
r
i
t
i
n
g
-
O
r
i
g
i
n
a
l
D
r
a
f
t
E
:
W
r
i
t
i
n
g
-
R
e
v
i
e
w
&
E
d
i
t
i
n
g
Vi
:
Vi
su
a
l
i
z
a
t
i
o
n
Su
:
Su
p
e
r
v
i
s
i
o
n
P
:
P
r
o
j
e
c
t
a
d
mi
n
i
st
r
a
t
i
o
n
Fu
:
Fu
n
d
i
n
g
a
c
q
u
i
si
t
i
o
n
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4
7
5
2
C
o
mp
r
eh
en
s
ive
s
ec
u
r
e
co
d
e
r
ev
iew
a
n
a
lysi
s
o
f web
a
p
p
lica
t
io
n
s
ec
u
r
ity
…
(
A
z
lin
d
a
A
b
d
u
l
A
z
iz
)
1813
CO
NF
L
I
C
T
O
F
I
N
T
E
R
E
S
T
ST
A
T
E
M
E
NT
T
h
e
au
th
o
r
s
d
ec
lar
e
th
at
th
e
r
e
ar
e
n
o
c
o
n
f
licts
o
f
in
ter
est r
ela
ted
to
th
is
r
esear
ch
.
DATA AV
AI
L
AB
I
L
I
T
Y
T
h
e
d
ata
th
at
s
u
p
p
o
r
t
th
e
f
i
n
d
in
g
s
o
f
th
is
s
tu
d
y
ar
e
av
aila
b
le
f
r
o
m
th
e
c
o
r
r
esp
o
n
d
in
g
a
u
th
o
r
u
p
o
n
r
ea
s
o
n
ab
le
r
eq
u
est.
Du
e
to
p
r
i
v
ac
y
an
d
co
n
f
id
en
tiality
co
n
s
id
er
atio
n
s
,
th
e
d
ata
ar
e
n
o
t p
u
b
licly
av
ailab
le.
RE
F
E
R
E
NC
E
S
[
1
]
X
.
D
.
H
o
a
n
g
,
T.
H
.
N
g
u
y
e
n
,
a
n
d
H
.
D
.
P
h
a
m,
“
A
n
o
v
e
l
m
o
d
e
l
f
o
r
d
e
t
e
c
t
i
n
g
w
e
b
d
e
f
a
c
e
me
n
t
a
t
t
a
c
k
s
t
r
a
n
sf
o
r
m
e
r
u
s
i
n
g
p
l
a
i
n
t
e
x
t
f
e
a
t
u
r
e
s,
”
I
n
d
o
n
e
si
a
n
J
o
u
r
n
a
l
o
f
E
l
e
c
t
ri
c
a
l
En
g
i
n
e
e
r
i
n
g
a
n
d
C
o
m
p
u
t
e
r
S
c
i
e
n
c
e
(
I
J
EE
C
S
)
,
v
o
l
.
3
7
,
n
o
.
1
,
p
p
.
2
3
2
-
2
4
0
,
Ja
n
.
2
0
2
5
,
d
o
i
:
1
0
.
1
1
5
9
1
/
i
j
e
e
c
s
.
v
3
7
.
i
1
.
p
p
2
3
2
-
2
4
0
.
[
2
]
A
.
A
.
A
l
m
u
t
a
i
r
i
,
S
.
M
i
sh
r
a
,
a
n
d
M
.
A
l
S
h
e
h
r
i
,
“
W
e
b
s
e
c
u
r
i
t
y
:
e
mer
g
i
n
g
t
h
r
e
a
t
s
a
n
d
d
e
f
e
n
se
,
”
C
o
m
p
u
t
e
r
S
y
st
e
m
s
S
c
i
e
n
c
e
a
n
d
En
g
i
n
e
e
ri
n
g
,
v
o
l
.
4
0
,
n
o
.
3
,
p
p
.
1
2
3
3
-
1
2
4
8
,
2
0
2
1
,
d
o
i
:
1
0
.
3
2
6
0
4
/
C
S
S
E
.
2
0
2
2
.
0
1
9
4
2
7
.
[
3
]
S
.
C
a
l
z
a
v
a
r
a
,
R
.
F
o
c
a
r
d
i
,
M
.
S
q
u
a
r
c
i
n
a
,
a
n
d
M
.
T
e
m
p
e
s
t
a
,
“
S
u
r
v
i
v
i
n
g
t
h
e
w
e
b
:
a
j
o
u
r
n
e
y
i
n
t
o
w
e
b
sess
i
o
n
se
c
u
r
i
t
y
,
”
i
n
T
h
e
We
b
C
o
n
f
e
re
n
c
e
2
0
1
8
-
C
o
m
p
a
n
i
o
n
o
f
t
h
e
Wo
r
l
d
Wi
d
e
We
b
C
o
n
f
e
r
e
n
c
e
,
WW
W
2
0
1
8
,
N
e
w
Y
o
r
k
,
N
e
w
Y
o
r
k
,
U
S
A
:
A
C
M
P
r
e
ss
,
2
0
1
8
,
p
p
.
4
5
1
-
4
5
5
.
d
o
i
:
1
0
.
1
1
4
5
/
3
1
8
4
5
5
8
.
3
1
8
6
2
3
2
.
[
4
]
V
.
A
b
d
u
l
l
a
y
e
v
a
n
d
A
.
S
.
C
h
a
u
h
a
n
,
“
S
Q
L
i
n
j
e
c
t
i
o
n
a
t
t
a
c
k
:
q
u
i
c
k
v
i
e
w
,
”
Me
s
o
p
o
t
a
m
i
a
n
J
o
u
r
n
a
l
o
f
C
y
b
e
r
S
e
c
u
ri
t
y
,
v
o
l
.
2
0
2
3
,
p
p
.
3
0
-
3
4
,
F
e
b
.
2
0
2
3
,
d
o
i
:
1
0
.
5
8
4
9
6
/
M
JC
S
/
2
0
2
3
/
0
0
6
.
[
5
]
Y
.
A
sh
i
b
a
n
i
a
n
d
Q
.
H
.
M
a
h
m
o
u
d
,
“
C
y
b
e
r
p
h
y
si
c
a
l
s
y
st
e
ms
s
e
c
u
r
i
t
y
:
a
n
a
l
y
s
i
s,
c
h
a
l
l
e
n
g
e
s a
n
d
s
o
l
u
t
i
o
n
s
,
”
C
o
m
p
u
t
e
rs a
n
d
S
e
c
u
r
i
t
y
,
v
o
l
.
6
8
,
p
p
.
8
1
-
9
7
,
Ju
l
.
2
0
1
7
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
c
o
s
e
.
2
0
1
7
.
0
4
.
0
0
5
.
[
6
]
H
.
L
a
mse
l
l
a
k
a
n
d
M
.
G
.
B
e
l
k
a
sm
i
,
“
G
l
o
b
a
l
s
o
f
t
w
a
r
e
d
e
v
e
l
o
p
m
e
n
t
a
g
i
l
e
p
l
a
n
n
i
n
g
mo
d
e
l
:
c
h
a
l
l
e
n
g
e
s
a
n
d
c
u
r
r
e
n
t
t
r
e
n
d
s,
”
I
n
d
o
n
e
si
a
n
J
o
u
r
n
a
l
o
f
El
e
c
t
r
i
c
a
l
En
g
i
n
e
e
ri
n
g
a
n
d
C
o
m
p
u
t
e
r
S
c
i
e
n
c
e
(
I
J
EEC
S
)
,
v
o
l
.
3
2
,
n
o
.
3
,
p
p
.
1
7
7
4
-
1
7
8
4
,
D
e
c
.
2
0
2
3
,
d
o
i
:
1
0
.
1
1
5
9
1
/
I
JEEC
S
.
V
3
2
.
I
3
.
P
P
1
7
7
4
-
1
7
8
4
.
[
7
]
R
.
A
.
K
h
a
n
,
S
.
U
.
K
h
a
n
,
H
.
U
.
K
h
a
n
,
a
n
d
M
.
I
l
y
a
s
,
“
S
y
st
e
ma
t
i
c
l
i
t
e
r
a
t
u
r
e
r
e
v
i
e
w
o
n
s
e
c
u
r
i
t
y
r
i
sk
s
a
n
d
i
t
s
p
r
a
c
t
i
c
e
s
i
n
s
e
c
u
r
e
so
f
t
w
a
r
e
d
e
v
e
l
o
p
me
n
t
,
”
I
EEE
Ac
c
e
ss
,
v
o
l
.
1
0
,
p
p
.
5
4
5
6
–
5
4
8
1
,
2
0
2
2
,
d
o
i
:
1
0
.
1
1
0
9
/
A
C
C
ESS
.
2
0
2
2
.
3
1
4
0
1
8
1
.
[
8
]
Q
.
W
a
n
g
e
t
a
l
.
,
“
B
r
e
a
k
t
h
e
w
a
l
l
f
r
o
m
b
o
t
t
o
m
:
a
u
t
o
m
a
t
e
d
d
i
s
c
o
v
e
r
y
o
f
p
r
o
t
o
c
o
l
-
l
e
v
e
l
e
v
a
s
i
o
n
v
u
l
n
e
r
a
b
i
l
i
t
i
e
s
i
n
w
e
b
a
p
p
l
i
c
a
t
i
o
n
f
i
r
e
w
a
l
l
s
,
”
i
n
P
r
o
c
e
e
d
i
n
g
s
-
I
E
E
E
S
y
m
p
o
s
i
u
m
o
n
S
e
c
u
r
i
t
y
a
n
d
P
r
i
v
a
c
y
,
I
E
E
E
,
M
a
y
2
0
2
4
,
p
p
.
1
8
5
-
2
0
2
.
d
o
i
:
1
0
.
1
1
0
9
/
S
P
5
4
2
6
3
.
2
0
2
4
.
0
0
1
2
9
.
[
9
]
J.
H
e
i
n
o
,
A
.
H
a
k
k
a
l
a
,
a
n
d
S
.
V
i
r
t
a
n
e
n
,
“
S
t
u
d
y
o
f
me
t
h
o
d
s
f
o
r
e
n
d
p
o
i
n
t
a
w
a
r
e
i
n
sp
e
c
t
i
o
n
i
n
a
n
e
x
t
g
e
n
e
r
a
t
i
o
n
f
i
r
e
w
a
l
l
,
”
C
y
b
e
rs
e
c
u
ri
t
y
,
v
o
l
.
5
,
n
o
.
1
,
p
.
2
5
,
S
e
p
.
2
0
2
2
,
d
o
i
:
1
0
.
1
1
8
6
/
s
4
2
4
0
0
-
0
2
2
-
0
0
1
2
7
-
8.
[
1
0
]
N
.
D
i
ssa
n
a
y
a
k
e
,
A
.
Ja
y
a
t
i
l
a
k
a
,
M
.
Za
h
e
d
i
,
a
n
d
M
.
A
.
B
a
b
a
r
,
“
S
o
f
t
w
a
r
e
sec
u
r
i
t
y
p
a
t
c
h
ma
n
a
g
e
me
n
t
-
a
s
y
s
t
e
m
a
t
i
c
l
i
t
e
r
a
t
u
r
e
r
e
v
i
e
w
o
f
c
h
a
l
l
e
n
g
e
s
,
a
p
p
r
o
a
c
h
e
s,
t
o
o
l
s
a
n
d
p
r
a
c
t
i
c
e
s,
”
I
n
f
o
rm
a
t
i
o
n
a
n
d
S
o
f
t
w
a
r
e
T
e
c
h
n
o
l
o
g
y
,
v
o
l
.
1
4
4
,
p
.
1
0
6
7
7
1
,
A
p
r
.
2
0
2
2
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
i
n
f
s
o
f
.
2
0
2
1
.
1
0
6
7
7
1
.
[
1
1
]
M
.
A
l
saff
a
r
e
t
a
l
.
,
“
D
e
t
e
c
t
i
o
n
o
f
w
e
b
c
r
o
ss
-
s
i
t
e
scr
i
p
t
i
n
g
(
X
S
S
)
a
t
t
a
c
k
s,”
E
l
e
c
t
r
o
n
i
c
s
,
v
o
l
.
1
1
,
n
o
.
1
4
,
p
.
2
2
1
2
,
J
u
l
.
2
0
2
2
,
d
o
i
:
1
0
.
3
3
9
0
/
e
l
e
c
t
r
o
n
i
c
s1
1
1
4
2
2
1
2
.
[
1
2
]
L.
B
r
a
z
,
E
.
F
r
e
g
n
a
n
,
G
.
C
a
l
i
k
l
i
,
a
n
d
A
.
B
a
c
c
h
e
l
l
i
,
“
W
h
y
d
o
n
’
t
d
e
v
e
l
o
p
e
r
s
d
e
t
e
c
t
i
m
p
r
o
p
e
r
i
n
p
u
t
v
a
l
i
d
a
t
i
o
n
?
’
;
D
R
O
P
TA
B
LE
p
a
p
e
r
s;
--
,
”
i
n
Pr
o
c
e
e
d
i
n
g
s
-
I
n
t
e
r
n
a
t
i
o
n
a
l
C
o
n
f
e
r
e
n
c
e
o
n
S
o
f
t
w
a
re
En
g
i
n
e
e
ri
n
g
,
I
EEE,
M
a
y
2
0
2
1
,
p
p
.
4
9
9
-
5
1
1
.
d
o
i
:
1
0
.
1
1
0
9
/
I
C
S
E
4
3
9
0
2
.
2
0
2
1
.
0
0
0
5
4
.
[
1
3
]
A
.
O
.
A
g
b
a
k
w
u
r
u
a
n
d
D
.
O
.
N
j
o
k
u
,
“
S
Q
L
i
n
j
e
c
t
i
o
n
a
t
t
a
c
k
o
n
w
e
b
b
a
s
e
a
p
p
l
i
c
a
t
i
o
n
:
v
u
l
n
e
r
a
b
i
l
i
t
y
a
ss
e
ssm
e
n
t
s
a
n
d
d
e
t
e
c
t
i
o
n
t
e
c
h
n
i
q
u
e
,
”
I
n
t
e
r
n
a
t
i
o
n
a
l
Re
s
e
a
r
c
h
J
o
u
rn
a
l
o
f
En
g
i
n
e
e
ri
n
g
a
n
d
T
e
c
h
n
o
l
o
g
y
,
p
p
.
2
4
3
–
2
5
2
,
2
0
2
1
.
[
1
4
]
W
.
P
.
K
.
F
e
r
n
a
n
d
o
,
D
.
A
.
N
.
P
.
D
i
ss
a
n
a
y
a
k
e
,
S
.
G
.
V
.
D
.
D
u
s
h
ma
n
t
h
a
,
D
.
L
.
C
.
P
.
L
i
y
a
n
a
g
e
,
a
n
d
C
.
K
a
r
u
n
a
t
i
l
a
k
e
,
“
C
h
a
l
l
e
n
g
e
s
a
n
d
o
p
p
o
r
t
u
n
i
t
i
e
s
i
n
p
a
ssw
o
r
d
ma
n
a
g
e
me
n
t
:
a
r
e
v
i
e
w
o
f
c
u
r
r
e
n
t
s
o
l
u
t
i
o
n
s,
”
S
ri
L
a
n
k
a
J
o
u
r
n
a
l
o
f
S
o
c
i
a
l
S
c
i
e
n
c
e
s
a
n
d
H
u
m
a
n
i
t
i
e
s
,
v
o
l
.
3
,
n
o
.
2
,
p
p
.
9
-
2
0
,
A
u
g
.
2
0
2
3
,
d
o
i
:
1
0
.
4
0
3
8
/
sl
j
ssh
.
v
3
i
2
.
9
6
.
[
1
5
]
Ö
.
A
sl
a
n
,
S
.
S
.
A
k
t
u
ğ
,
M
.
O
z
k
a
n
-
O
k
a
y
,
A
.
A
.
Y
i
l
m
a
z
,
a
n
d
E
.
A
k
i
n
,
“
A
c
o
mp
r
e
h
e
n
s
i
v
e
r
e
v
i
e
w
o
f
c
y
b
e
r
sec
u
r
i
t
y
v
u
l
n
e
r
a
b
i
l
i
t
i
e
s,
t
h
r
e
a
t
s
,
a
t
t
a
c
k
s,
a
n
d
so
l
u
t
i
o
n
s,
”
E
l
e
c
t
r
o
n
i
c
s
,
v
o
l
.
1
2
,
n
o
.
6
,
p
.
1
3
3
3
,
M
a
r
.
2
0
2
3
,
d
o
i
:
1
0
.
3
3
9
0
/
e
l
e
c
t
r
o
n
i
c
s1
2
0
6
1
3
3
3
.
[
1
6
]
R
.
L.
A
l
a
o
u
i
a
n
d
E.
H
.
N
f
a
o
u
i
,
“
D
e
e
p
l
e
a
r
n
i
n
g
f
o
r
v
u
l
n
e
r
a
b
i
l
i
t
y
a
n
d
a
t
t
a
c
k
d
e
t
e
c
t
i
o
n
o
n
w
e
b
a
p
p
l
i
c
a
t
i
o
n
s:
a
s
y
st
e
ma
t
i
c
l
i
t
e
r
a
t
u
r
e
r
e
v
i
e
w
,
”
F
u
t
u
re
I
n
t
e
r
n
e
t
,
v
o
l
.
1
4
,
n
o
.
4
,
p
.
1
1
8
,
A
p
r
.
2
0
2
2
,
d
o
i
:
1
0
.
3
3
9
0
/
f
i
1
4
0
4
0
1
1
8
.
[
1
7
]
W
.
C
h
a
r
o
e
n
w
e
t
,
P
.
T
h
o
n
g
t
a
n
u
n
a
m
,
V
.
T
.
P
h
a
m
,
a
n
d
C
.
T
r
e
u
d
e
,
“
T
o
w
a
r
d
e
f
f
e
c
t
i
v
e
s
e
c
u
r
e
c
o
d
e
r
e
v
i
e
w
s
:
a
n
e
m
p
i
r
i
c
a
l
s
t
u
d
y
o
f
s
e
c
u
r
i
t
y
-
r
e
l
a
t
e
d
c
o
d
i
n
g
w
e
a
k
n
e
s
s
e
s
,
”
E
m
p
i
r
i
c
a
l
S
o
f
t
w
a
r
e
E
n
g
i
n
e
e
r
i
n
g
,
v
o
l
.
2
9
,
n
o
.
4
,
p
.
8
8
,
J
u
l
.
2
0
2
4
,
d
o
i
:
1
0
.
1
0
0
7
/
s
1
0
6
6
4
-
024
-
10496
-
y.
[
1
8
]
L.
B
r
a
z
,
C
.
A
e
b
e
r
h
a
r
d
,
G
.
C
a
l
i
k
l
i
,
a
n
d
A
.
B
a
c
c
h
e
l
l
i
,
“
L
e
ss
i
s
m
o
r
e
:
s
u
p
p
o
r
t
i
n
g
d
e
v
e
l
o
p
e
r
s
i
n
v
u
l
n
e
r
a
b
i
l
i
t
y
d
e
t
e
c
t
i
o
n
d
u
r
i
n
g
c
o
d
e
r
e
v
i
e
w
,
”
i
n
Pro
c
e
e
d
i
n
g
s
-
I
n
t
e
r
n
a
t
i
o
n
a
l
C
o
n
f
e
r
e
n
c
e
o
n
S
o
f
t
w
a
re
En
g
i
n
e
e
ri
n
g
,
N
e
w
Y
o
r
k
,
N
Y
,
U
S
A
:
A
C
M
,
M
a
y
2
0
2
2
,
p
p
.
1
3
1
7
-
1
3
2
9
.
d
o
i
:
1
0
.
1
1
4
5
/
3
5
1
0
0
0
3
.
3
5
1
1
5
6
0
.
[
1
9
]
G
.
D
e
e
p
a
a
n
d
P
.
S
.
Th
i
l
a
g
a
m,
“
S
e
c
u
r
i
n
g
w
e
b
a
p
p
l
i
c
a
t
i
o
n
s
f
r
o
m
i
n
j
e
c
t
i
o
n
a
n
d
l
o
g
i
c
v
u
l
n
e
r
a
b
i
l
i
t
i
e
s
:
A
p
p
r
o
a
c
h
e
s
a
n
d
c
h
a
l
l
e
n
g
e
s
,
”
I
n
f
o
rm
a
t
i
o
n
a
n
d
S
o
f
t
w
a
re
T
e
c
h
n
o
l
o
g
y
,
v
o
l
.
7
4
,
p
p
.
1
6
0
-
1
8
0
,
Ju
n
.
2
0
1
6
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
i
n
f
so
f
.
2
0
1
6
.
0
2
.
0
0
5
.
[
2
0
]
R
.
A
.
P
u
t
r
a
,
I
.
A
.
K
a
u
t
s
a
r
,
H
.
H
i
n
d
a
r
t
o
,
a
n
d
S
.
S
u
mar
n
o
,
“
D
e
t
e
c
t
i
o
n
a
n
d
p
r
e
v
e
n
t
i
o
n
o
f
i
n
se
c
u
r
e
d
i
r
e
c
t
o
b
j
e
c
t
r
e
f
e
r
e
n
c
e
s
(
I
D
O
R
)
i
n
w
e
b
si
t
e
-
b
a
s
e
d
a
p
p
l
i
c
a
t
i
o
n
s,”
Pr
o
c
e
d
i
a
o
f
En
g
i
n
e
e
r
i
n
g
a
n
d
L
i
f
e
S
c
i
e
n
c
e
,
v
o
l
.
4
,
Ju
l
.
2
0
2
3
,
d
o
i
:
1
0
.
2
1
0
7
0
/
p
e
l
s
.
v
4
i
0
.
1
4
3
5
.
[
2
1
]
L.
B
r
a
z
a
n
d
A
.
B
a
c
c
h
e
l
l
i
,
“
S
o
f
t
w
a
r
e
sec
u
r
i
t
y
d
u
r
i
n
g
mo
d
e
r
n
c
o
d
e
r
e
v
i
e
w
:
t
h
e
d
e
v
e
l
o
p
e
r
’
s
p
e
r
s
p
e
c
t
i
v
e
,
”
i
n
ES
E
C
/
F
S
E
2
0
2
2
-
Pro
c
e
e
d
i
n
g
s
o
f
t
h
e
3
0
t
h
AC
M
J
o
i
n
t
Me
e
t
i
n
g
E
u
r
o
p
e
a
n
S
o
f
t
w
a
re
E
n
g
i
n
e
e
ri
n
g
C
o
n
f
e
re
n
c
e
a
n
d
S
y
m
p
o
s
i
u
m
o
n
t
h
e
Fo
u
n
d
a
t
i
o
n
s
o
f
S
o
f
t
w
a
re
En
g
i
n
e
e
ri
n
g
,
N
e
w
Y
o
r
k
,
N
Y
,
U
S
A
:
A
C
M
,
N
o
v
.
2
0
2
2
,
p
p
.
8
1
0
-
8
2
1
.
d
o
i
:
1
0
.
1
1
4
5
/
3
5
4
0
2
5
0
.
3
5
4
9
1
3
5
.
[
2
2
]
S
.
A
l
a
z
m
i
a
n
d
D
.
C
.
D
e
Le
o
n
,
“
A
sy
s
t
e
mat
i
c
l
i
t
e
r
a
t
u
r
e
r
e
v
i
e
w
o
n
t
h
e
c
h
a
r
a
c
t
e
r
i
st
i
c
s
a
n
d
e
f
f
e
c
t
i
v
e
n
e
ss
o
f
w
e
b
a
p
p
l
i
c
a
t
i
o
n
v
u
l
n
e
r
a
b
i
l
i
t
y
sc
a
n
n
e
r
s,
”
I
E
EE
A
c
c
e
ss
,
v
o
l
.
1
0
,
p
p
.
3
3
2
0
0
-
3
3
2
1
9
,
2
0
2
2
,
d
o
i
:
1
0
.
1
1
0
9
/
A
C
C
ESS
.
2
0
2
2
.
3
1
6
1
5
2
2
.
[2
3
]
Z.
Li
e
t
a
l
.
,
“
A
u
t
o
ma
t
i
n
g
c
o
d
e
r
e
v
i
e
w
a
c
t
i
v
i
t
i
e
s
b
y
l
a
r
g
e
-
sca
l
e
p
r
e
-
t
r
a
i
n
i
n
g
,
”
i
n
E
S
E
C
/
F
S
E
2
0
2
2
-
Pr
o
c
e
e
d
i
n
g
s
o
f
t
h
e
3
0
t
h
A
C
M
J
o
i
n
t
Me
e
t
i
n
g
E
u
ro
p
e
a
n
S
o
f
t
w
a
re
En
g
i
n
e
e
ri
n
g
C
o
n
f
e
re
n
c
e
a
n
d
S
y
m
p
o
si
u
m
o
n
t
h
e
F
o
u
n
d
a
t
i
o
n
s
o
f
S
o
f
t
w
a
r
e
En
g
i
n
e
e
ri
n
g
,
N
e
w
Y
o
r
k
,
N
Y
,
U
S
A
:
A
C
M
,
N
o
v
.
2
0
2
2
,
p
p
.
1
0
3
5
-
1
0
4
7
.
d
o
i
:
1
0
.
1
1
4
5
/
3
5
4
0
2
5
0
.
3
5
4
9
0
8
1
.
[2
4
]
V
.
C
a
so
l
a
,
A
.
D
e
B
e
n
e
d
i
c
t
i
s,
C
.
M
a
z
z
o
c
c
a
,
a
n
d
V
.
O
r
b
i
n
a
t
o
,
“
S
e
c
u
r
e
s
o
f
t
w
a
r
e
d
e
v
e
l
o
p
me
n
t
a
n
d
t
e
s
t
i
n
g
:
A
m
o
d
e
l
-
b
a
se
d
met
h
o
d
o
l
o
g
y
,
”
C
o
m
p
u
t
e
rs
a
n
d
S
e
c
u
r
i
t
y
,
v
o
l
.
1
3
7
,
p
.
1
0
3
6
3
9
,
F
e
b
.
2
0
2
4
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
c
o
se.
2
0
2
3
.
1
0
3
6
3
9
.
[2
5
]
S
.
K
a
r
t
u
n
o
v
,
“
P
r
o
t
e
c
t
i
o
n
o
f
u
ser
c
r
e
d
e
n
t
i
a
l
s
i
n
w
e
b
a
p
p
l
i
c
a
t
i
o
n
,
”
i
n
T
h
e
m
a
t
i
c
c
o
n
f
e
r
e
n
c
e
p
r
o
c
e
e
d
i
n
g
s
o
f
i
n
t
e
rn
a
t
i
o
n
a
l
si
g
n
i
f
i
c
a
n
c
e
[E
l
e
k
t
r
o
n
s
k
i
i
zv
o
r]/
I
n
t
e
rn
a
t
i
o
n
a
l
S
c
i
e
n
t
i
f
i
c
C
o
n
f
e
re
n
c
e
,
2
0
2
0
,
p
p
.
6
0
4
-
6
1
0
.
[
O
n
l
i
n
e
]
.
A
v
a
i
l
a
b
l
e
:
h
t
t
p
:
/
/
j
a
k
o
v
.
k
p
u
.
e
d
u
.
r
s
/
h
a
n
d
l
e
/
1
2
3
4
5
6
7
8
9
/
1
3
3
4
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
5
2
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
,
Vo
l.
3
9
,
No
.
3
,
Sep
tem
b
er
20
25
:
1
8
0
7
-
1
8
1
4
1814
B
I
O
G
RAP
H
I
E
S O
F
AUTH
O
RS
Az
li
n
d
a
Ab
d
u
l
Az
iz
re
c
e
iv
e
d
h
e
r
P
h
.
D.
i
n
c
o
m
p
u
ti
n
g
fr
o
m
U
n
iv
e
rsiti
S
e
lan
g
o
r
(UN
IS
EL
),
M
a
la
y
sia
,
i
n
2
0
2
2
,
a
n
M
.
S
c
.
i
n
c
o
m
p
u
ter
sc
ien
c
e
(d
i
strib
u
te
d
c
o
m
p
u
ti
n
g
)
fro
m
Un
iv
e
rsiti
P
u
tra
M
a
lay
sia
i
n
2
0
0
3
,
a
n
d
a
Ba
c
h
e
lo
r
o
f
S
c
ien
c
e
in
c
o
m
p
u
ter
sc
ien
c
e
fro
m
Un
iv
e
rsiti
P
u
tra
M
a
lay
sia
in
2
0
0
0
.
He
r
re
se
a
rc
h
in
tere
sts
in
c
lu
d
e
Io
T
a
n
d
c
l
o
u
d
c
o
m
p
u
ti
n
g
,
c
y
b
e
rse
c
u
rit
y
a
n
d
we
b
se
c
u
rit
y
,
c
o
m
p
u
ter
a
n
d
n
e
two
r
k
se
c
u
ri
ty
,
a
s
we
ll
a
s
tele
c
o
m
m
u
n
ica
ti
on
a
n
d
n
e
tw
o
rk
f
o
re
n
sic
s
.
S
h
e
c
a
n
b
e
c
o
n
tac
ted
a
t
e
m
a
il
:
a
z
li
n
d
a
a
z
iz@
u
it
m
.
e
d
u
.
m
y
.
Nur
Ra
z
ia
Bi
n
ti
M
o
h
d
S
u
r
a
d
i
re
c
e
iv
e
d
h
e
r
P
h
.
D
.
i
n
c
o
m
p
u
ti
n
g
fro
m
U
n
iv
e
rsiti
S
e
lan
g
o
r
(UN
IS
EL
)
i
n
2
0
2
3
,
M
a
ste
r’s
in
c
o
m
p
u
ter
sc
ien
c
e
(so
ftwa
re
e
n
g
in
e
e
rin
g
)
i
n
2
0
1
1
a
n
d
B.
S
c
.
De
g
re
e
i
n
c
o
m
p
u
ter
sc
ien
c
e
fro
m
Un
i
v
e
rsiti
S
a
in
s
M
a
lay
sia
in
1
9
9
0
.
He
r
field
s
o
f
in
tere
st
a
re
so
ftwa
re
e
n
g
in
e
e
rin
g
,
we
b
p
ro
g
ra
m
m
in
g
,
so
ftwa
re
q
u
a
li
ty
a
ss
u
ra
n
c
e
a
n
d
so
ftwa
re
tes
ti
n
g
.
S
h
e
c
a
n
b
e
c
o
n
tac
ted
a
t
e
m
a
il
:
ra
z
ia@
u
n
ise
l
.
e
d
u
.
m
y
.
Ra
h
a
y
u
H
a
n
d
a
n
re
c
e
iv
e
d
h
e
r
BBA
in
M
a
n
a
g
e
m
e
n
t
In
f
o
rm
a
ti
o
n
S
y
ste
m
s
(M
IS
)
a
n
d
In
tern
a
t
io
n
a
l
Bu
sin
e
ss
fro
m
Dre
x
e
l
Un
iv
e
rsity
,
P
A
,
USA,
i
n
1
9
9
9
,
a
n
d
h
e
r
M
.
S
c
.
in
Co
m
p
u
ter
S
c
ien
c
e
(IT
)
fr
o
m
UiTM
,
S
e
lan
g
o
r
,
M
a
lay
sia
,
i
n
2
0
1
2
.
He
r
re
se
a
rc
h
in
tere
sts
in
c
lu
d
e
tec
h
n
o
p
re
n
e
u
rsh
i
p
,
i
n
fo
r
m
a
ti
o
n
s
y
ste
m
s,
a
n
d
h
u
m
a
n
-
c
o
m
p
u
ter
in
tera
c
ti
o
n
.
S
h
e
c
a
n
b
e
c
o
n
tac
ted
a
t
e
m
a
il
:
ra
h
a
@u
n
ise
l.
e
d
u
.
m
y
.
Mo
h
d
N
o
o
r
Riz
a
l
Bin
Ar
b
a
in
re
c
e
iv
e
d
h
is
Di
p
l
o
m
a
in
e
lec
tro
n
ic
e
n
g
in
e
e
rin
g
(m
a
jo
rin
g
c
o
m
p
u
te
r)
fro
m
P
o
ly
t
e
c
h
n
ic
Un
g
k
u
Om
a
r
(P
UO
)
in
2
0
0
1
,
Ba
c
h
e
lo
r'
s
d
e
g
re
e
in
In
fo
rm
a
ti
o
n
Tec
h
n
o
lo
g
y
(
M
a
jo
ri
n
g
Ne
two
r
k
in
g
)
fro
m
Un
i
v
e
rsity
Uta
ra
M
a
lay
sia
(UU
M
)
in
2
0
0
4
a
n
d
M
a
ste
r'
s
in
i
n
fo
rm
a
ti
o
n
tec
h
n
o
l
o
g
y
(m
a
jo
ri
n
g
m
a
n
a
g
e
m
e
n
t
in
fo
rm
a
ti
o
n
sy
ste
m
)
fro
m
Un
i
v
e
rsity
S
e
lan
g
o
r
(UN
I
S
EL
)
i
n
2
0
1
0
.
C
u
rre
n
tl
y
p
u
rsu
i
n
g
a
P
h.
D
.
i
n
i
n
f
o
rm
a
ti
o
n
tec
h
n
o
l
o
g
y
(re
se
a
rc
h
in
fiel
d
c
y
b
e
rse
c
u
rit
y
a
n
d
d
e
e
p
lea
rn
i
n
g
)
fr
o
m
Un
iv
e
rsity
K
u
a
la
Lu
m
p
u
r
(UN
IKL),
M
a
lay
sia
.
His
fiel
d
i
n
tere
st
a
re
c
o
m
p
u
ter
n
e
two
r
k
in
g
,
c
y
b
e
rse
c
u
rit
y
,
a
n
d
d
e
e
p
lea
rn
in
g
.
He
c
a
n
b
e
c
o
n
tac
ted
a
t
e
m
a
il:
riza
l
-
it
@u
n
ise
l.
e
d
u
.
m
y
.
Evaluation Warning : The document was created with Spire.PDF for Python.