-
2
-
-
33644893036
-
Cert advisory ca-2000-02. malicious html tags embedded in client web requests
-
CERT, February
-
CERT, Cert advisory ca-2000-02. malicious html tags embedded in client web requests, February 2000.
-
(2000)
-
-
-
4
-
-
33749050466
-
Javassist: Java bytecode engineering made simple
-
January
-
S. Chiba, Javassist: Java bytecode engineering made simple. Java Developer's Journa, 9(1), January 2004.
-
(2004)
Java Developer's Journa
, vol.9
, Issue.1
-
-
Chiba, S.1
-
5
-
-
85084160792
-
Understanding data lifetime via whole system simulation
-
J. Chow, B. Pfaff, T. Garfinkel, K. Christopher, and M. Rosenblum. Understanding data lifetime via whole system simulation. In USENIX Security Symposium, 2004.
-
(2004)
USENIX Security Symposium
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
6
-
-
0036147522
-
Improving security using extensible lightweight static analysis
-
Jan/Feb
-
D. Evans and D. Larochelle. Improving security using extensible lightweight static analysis. IEEE Software, Jan/Feb, 2002.
-
(2002)
IEEE Software
-
-
Evans, D.1
Larochelle, D.2
-
7
-
-
33846282899
-
Practical, dynamic information flow for virtual machines
-
05-02, Department of Information and Computer Science, University of California, Irvine, Feb
-
V. Haldar, D. Chandra, and M. Franz. Practical, dynamic information flow for virtual machines. Technical Report TR 05-02, Department of Information and Computer Science, University of California, Irvine, Feb 2005.
-
(2005)
Technical Report TR
-
-
Haldar, V.1
Chandra, D.2
Franz, M.3
-
8
-
-
19944365247
-
Securing web application code by static analysis and runtime protection
-
May
-
Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D.-T. Lee, and S.-Y. Kuo, Securing web application code by static analysis and runtime protection. In Thirteenth International World Wide Web Conference, May 2004.
-
(2004)
Thirteenth International World Wide Web Conference
-
-
Huang, Y.-W.1
Yu, F.2
Hang, C.3
Tsai, C.-H.4
Lee, D.-T.5
Kuo, S.-Y.6
-
9
-
-
33745184790
-
Finding security vulnerabilities in Java using siatis analysis
-
V. B. Livshits and M. Lam. Finding security vulnerabilities in Java using siatis analysis. In USENIX Technology Symposium, 2005.
-
(2005)
USENIX Technology Symposium
-
-
Livshits, V.B.1
Lam, M.2
-
10
-
-
0032646625
-
JFlow: Practical Mostly-Static Information Flow Control
-
San Antonio, Texas, January 20-22
-
A. C. Myers, JFlow: Practical Mostly-Static Information Flow Control. In Conference Record of POPL'99: The 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pages 228-241, San Antonio, Texas, January 20-22, 1999.
-
(1999)
Conference Record of POPL'99: The 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 228-241
-
-
Myers, A.C.1
-
12
-
-
27544444280
-
Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on Commodity software
-
February
-
J. Newsome and D. Song. Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on Commodity software. In Network and Distributed Systems Security Symposium, February 2005.
-
(2005)
Network and Distributed Systems Security Symposium
-
-
Newsome, J.1
Song, D.2
-
13
-
-
84871349041
-
Automatically hardening web applications using precise tainting
-
May
-
A. Nguyen-Tuong, S. Guarnieri, D. Green, J. Shirley, and D. Evans. Automatically hardening web applications using precise tainting. In IFIP Security Conference, May 2005.
-
(2005)
IFIP Security Conference
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Green, D.3
Shirley, J.4
Evans, D.5
-
14
-
-
33745213901
-
Defending against injection attacks through context-sensitive string evaluation
-
3615, IBM Research Report, June
-
T. Pietraszek and C. V. Berghe. Defending against injection attacks through context-sensitive string evaluation. Technical Report RZ 3615, IBM Research Report, June 2005.
-
(2005)
Technical Report RZ
-
-
Pietraszek, T.1
Berghe, C.V.2
-
15
-
-
33846295746
-
-
O. W. A. S. Project. The webgoat project. http://www.owasp.org/software/ webgoat.html.
-
O. W. A. S. Project. The webgoat project. http://www.owasp.org/software/ webgoat.html.
-
-
-
-
16
-
-
33846311947
-
-
O. W. A. S. Project. Top ten most critical web application security vulnerabilities, http://www.owasp.org/documentation/topten.html, January 2004.
-
O. W. A. S. Project. Top ten most critical web application security vulnerabilities, http://www.owasp.org/documentation/topten.html, January 2004.
-
-
-
-
19
-
-
33846328564
-
-
M. Surf and A. Shulman. How safe is it out there? http:www.imperva.com/ application.defense_center/papers/how_safe_is_it.html, June 2004.
-
M. Surf and A. Shulman. How safe is it out there? http:www.imperva.com/ application.defense_center/papers/how_safe_is_it.html, June 2004.
-
-
-
|