메뉴 건너뛰기




Volumn , Issue , 2007, Pages 237-249

JavaScript instrumentation for browser security

Author keywords

Edit automata; JavaScript; Program instrumentation; Web browser

Indexed keywords

CODES (SYMBOLS); EMBEDDED SYSTEMS; JAVA PROGRAMMING LANGUAGE; WEB BROWSERS;

EID: 34548253921     PISSN: 07308566     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1190216.1190252     Document Type: Conference Paper
Times cited : (67)

References (24)
  • 4
    • 33846480504 scopus 로고    scopus 로고
    • ECMAScript language specification
    • ECMA International, Edition, Dec
    • ECMA International. ECMAScript language specification. Stardard ECMA-262, 3rd Edition, http://www.ecma-international. org/publications/files/ECMA-ST/ Ecma-262.pdf, Dec. 1999.
    • (1999) Stardard , vol.ECMA-262
  • 5
    • 0033489650 scopus 로고    scopus 로고
    • SASI enforcement of security policies: A retrospective
    • Caledon Hills, Ontario, Canada, Sept
    • U. Erlingsson and F. B. Schneider. SASI enforcement of security policies: A retrospective. In Proc. 1999 New Security Paradigms Workshop, pages 87-95, Caledon Hills, Ontario, Canada, Sept. 1999.
    • (1999) Proc. 1999 New Security Paradigms Workshop , pp. 87-95
    • Erlingsson, U.1    Schneider, F.B.2
  • 7
    • 33846540174 scopus 로고    scopus 로고
    • Ajax: A new approach to web applications
    • Feb
    • J. J. Garrett. Ajax: A new approach to web applications. Adaptive Path essay, http://www.adaptivepath.com/ publications/essays/archives/000385 .php, Feb. 2005.
    • (2005) Adaptive Path essay
    • Garrett, J.J.1
  • 9
    • 34548253408 scopus 로고    scopus 로고
    • Document Object Model (DOM) level 3 core specification
    • recommendation, Nov
    • A. L. Hors, P. L. Hegaret, L. W. ad Gavin. Nicol, J. Robie, M. Champion, and S. Byrne. Document Object Model (DOM) level 3 core specification. W3C candidate recommendation, http://www. w3.org/TR/2003/CR-DOM-Level-3-Core- 20031107/, Nov. 2003.
    • (2003) W3C candidate
    • Hors, A.L.1    Hegaret, P.L.2    ad Gavin, L.W.3    Nicol4    Robie, J.5    Champion, M.6    Byrne, S.7
  • 13
    • 33846547540 scopus 로고    scopus 로고
    • ANTLR reference manual
    • manual, Jan
    • T. Parr et al., ANTLR reference manual. Reference manual, http: //www.antlr.org/, Jan. 2005.
    • (2005) Reference
    • Parr, T.1
  • 14
    • 33846500163 scopus 로고    scopus 로고
    • and, com/xss/http://www.pointblanksecurity.com/xss/xss2.php
    • Point Blank Security. The XSS blacklists, http://www.pointblanksecurity. com/xss/ and http://www.pointblanksecurity.com/xss/xss2 .php, 2002-2005.
    • (2002) Point Blank Security. The XSS blacklists, http
  • 16
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Sept
    • J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceeding of the IEEE, 63(9):1278-1308, Sept. 1975.
    • (1975) Proceeding of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 19
    • 33846534706 scopus 로고    scopus 로고
    • Symantec Corp, June
    • Symantec Corp. JS.Yamanner@m. Symantec Security Response, http://www.Symantec.com/security_response/writeup.jsp?docid=2006-061211-4111-99, June 2006.
    • (2006) JS.Yamanner@m. Symantec Security Response
  • 20
    • 24644446108 scopus 로고    scopus 로고
    • Towards a type system for analyzing JavaScript programs
    • Edinburgh, UK, Apr
    • P. Thiemann. Towards a type system for analyzing JavaScript programs. In Proc. 14th European Symposium on Programming, pages 408-422, Edinburgh, UK, Apr. 2005.
    • (2005) Proc. 14th European Symposium on Programming , pp. 408-422
    • Thiemann, P.1
  • 24
    • 84910681237 scopus 로고    scopus 로고
    • Static detection of security vulnerabilities in scripting languages
    • Vancouver, B.C, Canada, July
    • Y. Xie and A. Aiken. Static detection of security vulnerabilities in scripting languages. In Proc. 15th USENIX Security Symposium, Vancouver, B.C., Canada, July 2006.
    • (2006) Proc. 15th USENIX Security Symposium
    • Xie, Y.1    Aiken, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.