Evolution of Application Security based on OWASP Top 10 and CWE/SANS Top 25 with Predictions for the 2025 OWASP Top 10

  • Jinfeng Li*
  • , Haorong Li
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

The Open Web Application Security Project (OWASP) is widely recognized for its role in identifying and publishing the most critical vulnerabilities in the web application security domain through its OWASP Top 10 list. This study provides the first comprehensive evolutionary analysis of the OWASP Top 10, tracing its development from its inception to the most recent edition. By systematically analyzing historical trends, this research highlights key shifts in vulnerability patterns and emerging security challenges, offering a thorough perspective that expands upon existing literature on web application security. In particular, the study also presents a forward-looking projection for the upcoming 2025 OWASP Top 10, which is anticipated to be released later this year. This prediction is grounded in four primary factors influencing the evolving cybersecurity landscape: the increasing risks associated with artificial intelligence (AI) and machine learning (ML), the growing complexities of API and cloud security, the rising frequency of software supply chain attacks (SSCA), and the expanding impact of regulatory and compliance frameworks. The findings contribute significantly to the understanding of the dynamic threat environment, providing actionable insights for researchers, practitioners, and policymakers to enhance security strategies and mitigate future risks effectively.

Original languageEnglish
Title of host publicationProceedings of 8th International Conference on Inventive Computation Technologies, ICICT 2025
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1178-1183
Number of pages6
ISBN (Electronic)9798331512248
DOIs
Publication statusPublished - 23 Apr 2025
Externally publishedYes
Event8th International Conference on Inventive Computation Technologies, ICICT 2025 - Kirtipur, Nepal
Duration: 23 Apr 202525 Apr 2025

Publication series

NameProceedings of 8th International Conference on Inventive Computation Technologies, ICICT 2025

Conference

Conference8th International Conference on Inventive Computation Technologies, ICICT 2025
Country/TerritoryNepal
CityKirtipur
Period23/04/2525/04/25

Keywords

  • AI-based Security Risks
  • Application Security
  • Broken Access Control
  • Cloud-native Security
  • CWE/SANS
  • Cybersecurity Threats
  • Injection Attacks
  • OWASP
  • OWASP Top 10
  • Software Supply Chain Security

Fingerprint

Dive into the research topics of 'Evolution of Application Security based on OWASP Top 10 and CWE/SANS Top 25 with Predictions for the 2025 OWASP Top 10'. Together they form a unique fingerprint.

Cite this