-
1
-
-
0004072686
-
-
Addison-Wesley
-
A. Aho, R. Sethi, and J. Ullman. Compilers, Principles, Techniques and Tools. Addison-Wesley, 1986.
-
(1986)
Compilers, Principles, Techniques and Tools
-
-
Aho, A.1
Sethi, R.2
Ullman, J.3
-
2
-
-
0038304275
-
-
An NGSSoftware Insight Security Research (NISR) publication
-
C. Anley. Advanced SQL Injection in SQL Server Applications. An NGSSoftware Insight Security Research (NISR) publication, 2002. URL: http://www.nextgenss.com/papers/advanced_sql_injection.pdf.
-
(2002)
Advanced SQL Injection in SQL Server Applications
-
-
Anley, C.1
-
5
-
-
0041456161
-
Powerforms: Declarative client-side form field validation
-
C. Brabrand, A. Møller, M. Ricky, and M. I. Schwartzbach. Powerforms: Declarative client-side form field validation. World Wide Web, 3(4), 2000.
-
(2000)
World Wide Web
, vol.3
, Issue.4
-
-
Brabrand, C.1
Møller, A.2
Ricky, M.3
Schwartzbach, M.I.4
-
8
-
-
0034836394
-
Intrusion detection via static analysis
-
Oakland, CA, May. IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press
-
D. Dean and D. Wagner. Intrusion detection via static analysis. In Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 2001. IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press.
-
(2001)
Proceedings of the IEEE Symposium on Research in Security and Privacy
-
-
Dean, D.1
Wagner, D.2
-
9
-
-
4644322663
-
The Fugue protocol checker: Is your software baroque?
-
Microsoft Research, Jan.
-
R. DeLine and M. Fähndrich. The Fugue protocol checker: Is your software baroque? Technical Report MSR-TR-2004-07, Microsoft Research, Jan. 2004. http://research.microsoft.com/~maf/Papers/tr-2004-07.pdf.
-
(2004)
Technical Report
, vol.MSR-TR-2004-07
-
-
DeLine, R.1
Fähndrich, M.2
-
10
-
-
0032690845
-
A theory of type qualifiers
-
, Atlanta, Georgia, May 1-4
-
J. Foster, M. Fähndrich, and A. Aiken. A theory of type qualifiers. In Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), pages 192-203, Atlanta, Georgia, May 1-4, 1999.
-
(1999)
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI)
, pp. 192-203
-
-
Foster, J.1
Fähndrich, M.2
Aiken, A.3
-
14
-
-
84880450431
-
Web application security assessment by fault injection and behavior monitoring
-
Y.-W. Huang, S.-K. Huang, T.-P. Lin, and C.-H. Tsai. Web application security assessment by fault injection and behavior monitoring. In World Wide Web, 2003.
-
(2003)
World Wide Web
-
-
Huang, Y.-W.1
Huang, S.-K.2
Lin, T.-P.3
Tsai, C.-H.4
-
15
-
-
19944365247
-
Securing web application code by static analysis and runtime protection
-
Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D.-T. Lee, and S.-Y. Kuo. Securing web application code by static analysis and runtime protection. In World Wide Web, pages 40-52, 2004.
-
(2004)
World Wide Web
, pp. 40-52
-
-
Huang, Y.-W.1
Yu, F.2
Hang, C.3
Tsai, C.-H.4
Lee, D.-T.5
Kuo, S.-Y.6
-
16
-
-
84976706502
-
Global data flow analysis and iterative algorithms
-
J. B. Kam and J. D. Ullman. Global data flow analysis and iterative algorithms. Journal of the ACM, 23(1):158-171, 1976.
-
(1976)
Journal of the ACM
, vol.23
, Issue.1
, pp. 158-171
-
-
Kam, J.B.1
Ullman, J.D.2
-
21
-
-
0038108908
-
Access rights analysis for Java
-
Nov.
-
L. Koved, M. Pistoia, and A. Kershenbaum. Access rights analysis for Java. In Proceedings of the 17th Annual Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA), pages 359-372, Nov. 2002.
-
(2002)
Proceedings of the 17th Annual Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA)
, pp. 359-372
-
-
Koved, L.1
Pistoia, M.2
Kershenbaum, A.3
-
22
-
-
33244495360
-
Context-sensitive program analysis as database queries
-
June
-
M. S. Lam, J. Whaley, V. B. Livshits, M. Martin, D. Avots, M. Carbin, and C. Unkel. Context-sensitive program analysis as database queries. In Proceedings of the ACM Conference on Principles of Database Systems (PODS), June 2005.
-
(2005)
Proceedings of the ACM Conference on Principles of Database Systems (PODS)
-
-
Lam, M.S.1
Whaley, J.2
Livshits, V.B.3
Martin, M.4
Avots, D.5
Carbin, M.6
Unkel, C.7
-
24
-
-
84923564816
-
Finding security vulnerabilities in Java applications with static analysis
-
Aug. To appear
-
V. B. Livshits and M. S. Lam. Finding security vulnerabilities in Java applications with static analysis. In Usenix Security Symposium, Aug. 2005. To appear.
-
(2005)
Usenix Security Symposium
-
-
Livshits, V.B.1
Lam, M.S.2
-
26
-
-
33745194478
-
Finding application errors using PQL: A program query language
-
oct To appear
-
M. Martin, V. B. Livshits, and M. S. Lam. Finding application errors using PQL: a program query language. In 20th Annual ACM Conference on Object-Oriented Programming, Systems, Languages, oct 2005. To appear.
-
(2005)
20th Annual ACM Conference on Object-oriented Programming, Systems, Languages
-
-
Martin, M.1
Livshits, V.B.2
Lam, M.S.3
-
30
-
-
26444597311
-
Static analysis of role-based access control in J2EE applications
-
G. Naumovich and P. Centonze. Static analysis of role-based access control in J2EE applications. SIGSOFT Software Engineering Notes, 29(5): 1-10, 2004.
-
(2004)
SIGSOFT Software Engineering Notes
, vol.29
, Issue.5
, pp. 1-10
-
-
Naumovich, G.1
Centonze, P.2
-
31
-
-
84871349041
-
Automatically hardening web applications using precise tainting
-
A. Nguyen-Tuong, S. Guarnieri, D. Greene, J. Shirley, and D. Evans. Automatically hardening web applications using precise tainting. In Twentieth IFIP International Information Security Conference (SEC'05), 2005.
-
(2005)
Twentieth IFIP International Information Security Conference (SEC'05)
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Shirley, J.4
Evans, D.5
-
34
-
-
18844436602
-
-
Sanctum Inc. AppShield 4.0 Whitepaper., 2002. URL: http://www.sanctuminc.com.
-
(2002)
AppShield 4.0 Whitepaper
-
-
-
35
-
-
77953069969
-
Abstracting application-level web security
-
D. Scott and R. Sharp. Abstracting application-level web security. In World Wide Web, 2002.
-
(2002)
World Wide Web
-
-
Scott, D.1
Sharp, R.2
-
37
-
-
84858908974
-
-
Security Focus, http://www.securityfocus.com.
-
-
-
-
38
-
-
33745817665
-
SPI dynamics
-
Web Application Security Assessment
-
SPI Dynamics. Web Application Security Assessment. SPI Dynamics Whitepaper, 2003.
-
(2003)
SPI Dynamics Whitepaper
-
-
|