메뉴 건너뛰기




Volumn 40, Issue 10, 2005, Pages 365-383

Finding application errors and security flaws using PQL: A program query language

Author keywords

Bug finding; Pattern matching; Program traces; Resource leaks; SQL injection; Web applications

Indexed keywords

BUG FINDING; PROGRAM QUERY LANGUAGE (PQL); PROGRAM TRACES; RESOURCE LEAKS; SQL INJECTION; WEB APPLICATIONS;

EID: 33745203758     PISSN: 03621340     EISSN: 03621340     Source Type: Journal    
DOI: 10.1145/1103845.1094840     Document Type: Article
Times cited : (109)

References (62)
  • 8
    • 0038489696 scopus 로고    scopus 로고
    • SLIC: A Specification Language for Interface Checking (of C)
    • Microsoft Research, January
    • T. Ball and S. Rajamani. SLIC: A Specification Language for Interface Checking (of C). Technical Report MSR-TR-2001-21, Microsoft Research, January 2002.
    • (2002) Technical Report , vol.MSR-TR-2001-21
    • Ball, T.1    Rajamani, S.2
  • 14
    • 1942425806 scopus 로고    scopus 로고
    • Vulnerability testing of software system using fault injection
    • COAST, Purdue University, West Lafayette, IN, US, April
    • W. Du and A. P. Mathur. Vulnerability Testing of Software System Using Fault Injection. Technical report, COAST, Purdue University, West Lafayette, IN, US, April 1998.
    • (1998) Technical Report
    • Du, W.1    Mathur, A.P.2
  • 19
    • 0000596666 scopus 로고
    • Purify: Fast detection of memory leaks and access errors
    • December
    • R. Hastings and B. Joyce. Purify: Fast Detection of Memory Leaks and Access Errors. In Proceedings of the Winter USENIX Conference, pages 125-136, December 1992.
    • (1992) Proceedings of the Winter USENIX Conference , pp. 125-136
    • Hastings, R.1    Joyce, B.2
  • 21
    • 18944390941 scopus 로고    scopus 로고
    • The model checker SPIN
    • G. J. Holzmann. The Model Checker SPIN. Software Engineering, 23(5):279-295, 1997.
    • (1997) Software Engineering , vol.23 , Issue.5 , pp. 279-295
    • Holzmann, G.J.1
  • 28
    • 35248854618 scopus 로고    scopus 로고
    • A type system and analysis for the automatic extraction and enforcement of design information
    • Darmstadt, Germany, July
    • P. Lam and M. Rinard. A Type System and Analysis for the Automatic Extraction and Enforcement of Design Information. In Proceedings of the 17th European Conference on Object-Oriented Programming, pages 275-302, Darmstadt, Germany, July 2003.
    • (2003) Proceedings of the 17th European Conference on Object-oriented Programming , pp. 275-302
    • Lam, P.1    Rinard, M.2
  • 35
    • 84858903390 scopus 로고    scopus 로고
    • F.-M. S. mailing list
    • F.-M. S. mailing list. Vulnerability Scanner for SQL injection. http://www.derkeiler.com/Mailing-Lists/securityfocus/focus-ms/2003-09/0110.html, 2003.
    • (2003) Vulnerability Scanner for SQL Injection
  • 38
    • 18944381091 scopus 로고    scopus 로고
    • Redux: A dynamic dataflow tracer
    • O. Sokolsky and M. Viswanathan, editors. Elsevier
    • N. Nethercote and A. Mycroft. Redux: A Dynamic Dataflow Tracer. In O. Sokolsky and M. Viswanathan, editors, Electronic Notes in Theoretical Computer Science, volume 89. Elsevier, 2003.
    • (2003) Electronic Notes in Theoretical Computer Science , vol.89
    • Nethercote, N.1    Mycroft, A.2
  • 39
    • 16244366310 scopus 로고    scopus 로고
    • Valgrind: A program supervision framework
    • O. Sokolsky and M. Viswanathan, editors. Elsevier
    • N. Nethercote and J. Seward. Valgrind: A Program Supervision Framework. In O. Sokolsky and M. Viswanathan, editors, Electronic Notes in Theoretical Computer Science, volume 89. Elsevier, 2003.
    • (2003) Electronic Notes in Theoretical Computer Science , vol.89
    • Nethercote, N.1    Seward, J.2
  • 49
    • 84858905616 scopus 로고    scopus 로고
    • http://patterns.projects.cis.ksu.edu/.
  • 51
    • 14544288942 scopus 로고    scopus 로고
    • Manning Publications Co.
    • B. A. Tate. Bitter Java. Manning Publications Co., 2002.
    • (2002) Bitter Java
    • Tate, B.A.1
  • 52
    • 31744434131 scopus 로고    scopus 로고
    • April
    • M. Vernon. Top Five Threats. ComputerWeekly.com (http://www. computerweekly.com/Article129980.htm), April 2004.
    • (2004) Top Five Threats
    • Vernon, M.1
  • 56
    • 84858896305 scopus 로고    scopus 로고
    • Web Application Security Consortium. Threat Classification. http://www.webappsec.org/tc/WASC-TC-v1_0.pdf, 2004.
    • (2004) Threat Classification


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.