메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 303-311

Dynamic taint propagation for Java

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); INFORMATION SERVICES; SECURITY OF DATA; USER INTERFACES; WORLD WIDE WEB;

EID: 33846310068     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.2005.21     Document Type: Conference Paper
Times cited : (163)

References (21)
  • 2
    • 33644893036 scopus 로고    scopus 로고
    • Cert advisory ca-2000-02. malicious html tags embedded in client web requests
    • CERT, February
    • CERT, Cert advisory ca-2000-02. malicious html tags embedded in client web requests, February 2000.
    • (2000)
  • 4
    • 33749050466 scopus 로고    scopus 로고
    • Javassist: Java bytecode engineering made simple
    • January
    • S. Chiba, Javassist: Java bytecode engineering made simple. Java Developer's Journa, 9(1), January 2004.
    • (2004) Java Developer's Journa , vol.9 , Issue.1
    • Chiba, S.1
  • 6
    • 0036147522 scopus 로고    scopus 로고
    • Improving security using extensible lightweight static analysis
    • Jan/Feb
    • D. Evans and D. Larochelle. Improving security using extensible lightweight static analysis. IEEE Software, Jan/Feb, 2002.
    • (2002) IEEE Software
    • Evans, D.1    Larochelle, D.2
  • 7
    • 33846282899 scopus 로고    scopus 로고
    • Practical, dynamic information flow for virtual machines
    • 05-02, Department of Information and Computer Science, University of California, Irvine, Feb
    • V. Haldar, D. Chandra, and M. Franz. Practical, dynamic information flow for virtual machines. Technical Report TR 05-02, Department of Information and Computer Science, University of California, Irvine, Feb 2005.
    • (2005) Technical Report TR
    • Haldar, V.1    Chandra, D.2    Franz, M.3
  • 9
    • 33745184790 scopus 로고    scopus 로고
    • Finding security vulnerabilities in Java using siatis analysis
    • V. B. Livshits and M. Lam. Finding security vulnerabilities in Java using siatis analysis. In USENIX Technology Symposium, 2005.
    • (2005) USENIX Technology Symposium
    • Livshits, V.B.1    Lam, M.2
  • 12
    • 27544444280 scopus 로고    scopus 로고
    • Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on Commodity software
    • February
    • J. Newsome and D. Song. Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on Commodity software. In Network and Distributed Systems Security Symposium, February 2005.
    • (2005) Network and Distributed Systems Security Symposium
    • Newsome, J.1    Song, D.2
  • 14
    • 33745213901 scopus 로고    scopus 로고
    • Defending against injection attacks through context-sensitive string evaluation
    • 3615, IBM Research Report, June
    • T. Pietraszek and C. V. Berghe. Defending against injection attacks through context-sensitive string evaluation. Technical Report RZ 3615, IBM Research Report, June 2005.
    • (2005) Technical Report RZ
    • Pietraszek, T.1    Berghe, C.V.2
  • 15
    • 33846295746 scopus 로고    scopus 로고
    • O. W. A. S. Project. The webgoat project. http://www.owasp.org/software/ webgoat.html.
    • O. W. A. S. Project. The webgoat project. http://www.owasp.org/software/ webgoat.html.
  • 16
    • 33846311947 scopus 로고    scopus 로고
    • O. W. A. S. Project. Top ten most critical web application security vulnerabilities, http://www.owasp.org/documentation/topten.html, January 2004.
    • O. W. A. S. Project. Top ten most critical web application security vulnerabilities, http://www.owasp.org/documentation/topten.html, January 2004.
  • 19
    • 33846328564 scopus 로고    scopus 로고
    • M. Surf and A. Shulman. How safe is it out there? http:www.imperva.com/ application.defense_center/papers/how_safe_is_it.html, June 2004.
    • M. Surf and A. Shulman. How safe is it out there? http:www.imperva.com/ application.defense_center/papers/how_safe_is_it.html, June 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.