메뉴 건너뛰기




Volumn , Issue , 2005, Pages 85-94

Detecting malicious JavaScript code in Mozilla

Author keywords

JavaScript; Mobile Code; Web Applications

Indexed keywords

CLIENT SERVER COMPUTER SYSTEMS; CODES (SYMBOLS); EMBEDDED SYSTEMS; INFORMATION RETRIEVAL; PROBLEM SOLVING; PROGRAM INTERPRETERS; SECURITY OF DATA; WEB BROWSERS;

EID: 27144432843     PISSN: 27708527     EISSN: 27708535     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (104)

References (16)
  • 1
    • 10644230615 scopus 로고    scopus 로고
    • ECMA-262
    • ECMA-262, ECMAScript language specification, 1999. http://www.ecma-international. org/publications/standards/Ecma-262.htm.
    • (1999) ECMAScript Language Specification
  • 2
    • 0032203038 scopus 로고    scopus 로고
    • Secure web scripting
    • citeseer. ist. psu.edu/anupam98secure.html
    • V. Anupam and A. J. Mayer. Secure Web Scripting. IEEE Internet Computing, 2(6):46-55, 1998. citeseer. ist. psu.edu/anupam98secure.html.
    • (1998) IEEE Internet Computing , vol.2 , Issue.6 , pp. 46-55
    • Anupam, V.1    Mayer, A.J.2
  • 10
    • 0037002475 scopus 로고    scopus 로고
    • Intrusion detection: A brief history and overview
    • April. Special publication on Security and Privacy
    • R. Kemmerer and G. Vigna. Intrusion Detection: A Brief History and Overview. IEEE Computer, pages 27-30, April 2002. Special publication on Security and Privacy.
    • (2002) IEEE Computer , pp. 27-30
    • Kemmerer, R.1    Vigna, G.2
  • 11
    • 0005433665 scopus 로고    scopus 로고
    • Mobile code security techniques
    • citeseer.ist.psu. edu/moore98mobile.html
    • J. T. Moore. Mobile Code Security Techniques. Technical Report MS-CIS-98-28, 1998. citeseer.ist.psu. edu/moore98mobile.html.
    • (1998) Technical Report , vol.MS-CIS-98-28
    • Moore, J.T.1
  • 13
    • 4043174205 scopus 로고    scopus 로고
    • The safe-Tcl security model
    • citeseer.ist.psu.edu/ousterhout97safetc1.html
    • J. K. Ousterhout, J. Y. Levy, and B. B. Welch. The Safe-Tcl security model. Lecture Notes in Computer Science, 1419:217-, 1998. citeseer.ist.psu.edu/ousterhout97safetc1.html.
    • (1998) Lecture Notes in Computer Science , vol.1419 , pp. 217
    • Ousterhout, J.K.1    Levy, J.Y.2    Welch, B.B.3
  • 14
    • 0242671076 scopus 로고    scopus 로고
    • Janus: An approach for confinement of untrusted applications
    • December
    • D. A. Wagner. Janus: an Approach for Confinement of Untrusted Applications. Technical Report CSD-99-1056, December 1999.
    • (1999) Technical Report , vol.CSD-99-1056
    • Wagner, D.A.1
  • 15
    • 0027836576 scopus 로고
    • Efficient software-based fault isolation
    • December. citeseer.ist.psu.edu/wahbe93efficient. html
    • R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham. Efficient software-based fault isolation. ACM SIGOPS Operating Systems Review, 27(5):203-216, December 1993. citeseer.ist.psu.edu/wahbe93efficient. html.
    • (1993) ACM SIGOPS Operating Systems Review , vol.27 , Issue.5 , pp. 203-216
    • Wahbe, R.1    Lucco, S.2    Anderson, T.E.3    Graham, S.L.4
  • 16
    • 0003965705 scopus 로고    scopus 로고
    • Document Object Model (DOM) level 1 specification
    • W3 Consortium. Version 1.0
    • L. Wood. Document Object Model (DOM) Level 1 Specification. Technical Report REC-DOM-Level-1-19981001. W3 Consortium, 1998. Version 1.0.
    • (1998) Technical Report , vol.REC-DOM-LEVEL-1-19981001
    • Wood, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.