-
1
-
-
26444544471
-
Towards type inference for JavaScript
-
Glasgow, UK, July
-
C. Anderson, P. Giannini, and S. Drossopoulou. Towards type inference for JavaScript. In Proc. 19th European Conference on Object-Oriented Programming, pages 429-452, Glasgow, UK, July 2005.
-
(2005)
Proc. 19th European Conference on Object-Oriented Programming
, pp. 429-452
-
-
Anderson, C.1
Giannini, P.2
Drossopoulou, S.3
-
2
-
-
31844457357
-
Composing security policies with Polymer
-
Chicago, IL, June
-
L. Bauer, J. Ligatti, and D. Walker. Composing security policies with Polymer. In Proc. 2005 ACM Conference on Programming Language Design and Implementation, pages 305-314, Chicago, IL, June 2005.
-
(2005)
Proc. 2005 ACM Conference on Programming Language Design and Implementation
, pp. 305-314
-
-
Bauer, L.1
Ligatti, J.2
Walker, D.3
-
3
-
-
85044841595
-
Client-side defense against web-based identity theft
-
San Diego, CA, Feb
-
N. Chou, R. Ledesma, Y. Teraguchi, D. Boneh, and J. C. Mitchell. Client-side defense against web-based identity theft. In Proc. 11th Annual Network and Distributed System Security Symposium, San Diego, CA, Feb. 2004.
-
(2004)
Proc. 11th Annual Network and Distributed System Security Symposium
-
-
Chou, N.1
Ledesma, R.2
Teraguchi, Y.3
Boneh, D.4
Mitchell, J.C.5
-
4
-
-
33846480504
-
ECMAScript language specification
-
ECMA International, Edition, Dec
-
ECMA International. ECMAScript language specification. Stardard ECMA-262, 3rd Edition, http://www.ecma-international. org/publications/files/ECMA-ST/ Ecma-262.pdf, Dec. 1999.
-
(1999)
Stardard
, vol.ECMA-262
-
-
-
5
-
-
0033489650
-
SASI enforcement of security policies: A retrospective
-
Caledon Hills, Ontario, Canada, Sept
-
U. Erlingsson and F. B. Schneider. SASI enforcement of security policies: A retrospective. In Proc. 1999 New Security Paradigms Workshop, pages 87-95, Caledon Hills, Ontario, Canada, Sept. 1999.
-
(1999)
Proc. 1999 New Security Paradigms Workshop
, pp. 87-95
-
-
Erlingsson, U.1
Schneider, F.B.2
-
7
-
-
33846540174
-
Ajax: A new approach to web applications
-
Feb
-
J. J. Garrett. Ajax: A new approach to web applications. Adaptive Path essay, http://www.adaptivepath.com/ publications/essays/archives/000385 .php, Feb. 2005.
-
(2005)
Adaptive Path essay
-
-
Garrett, J.J.1
-
9
-
-
34548253408
-
Document Object Model (DOM) level 3 core specification
-
recommendation, Nov
-
A. L. Hors, P. L. Hegaret, L. W. ad Gavin. Nicol, J. Robie, M. Champion, and S. Byrne. Document Object Model (DOM) level 3 core specification. W3C candidate recommendation, http://www. w3.org/TR/2003/CR-DOM-Level-3-Core- 20031107/, Nov. 2003.
-
(2003)
W3C candidate
-
-
Hors, A.L.1
Hegaret, P.L.2
ad Gavin, L.W.3
Nicol4
Robie, J.5
Champion, M.6
Byrne, S.7
-
10
-
-
13444275220
-
Edit automata: Enforcement mechanisms for run-time security policies
-
Feb
-
J. Ligatti, L. Bauer, and D. Walker. Edit automata: Enforcement mechanisms for run-time security policies. International Journal of Information Security, 4(2):2-16, Feb. 2005.
-
(2005)
International Journal of Information Security
, vol.4
, Issue.2
, pp. 2-16
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
11
-
-
14944340027
-
Identifying cross-site scripting vulnerabilities in web applications
-
Washington, DC
-
G. A. D. Lucca, A. R. Fasolino, M. Mastoianni, and P. Tramontana. Identifying cross-site scripting vulnerabilities in web applications. In Proc. 6th IEEE International Workshop on Web Site Evolution, pages 71-80, Washington, DC, 2004.
-
(2004)
Proc. 6th IEEE International Workshop on Web Site Evolution
, pp. 71-80
-
-
Lucca, G.A.D.1
Fasolino, A.R.2
Mastoianni, M.3
Tramontana, P.4
-
13
-
-
33846547540
-
ANTLR reference manual
-
manual, Jan
-
T. Parr et al., ANTLR reference manual. Reference manual, http: //www.antlr.org/, Jan. 2005.
-
(2005)
Reference
-
-
Parr, T.1
-
14
-
-
33846500163
-
-
and, com/xss/http://www.pointblanksecurity.com/xss/xss2.php
-
Point Blank Security. The XSS blacklists, http://www.pointblanksecurity. com/xss/ and http://www.pointblanksecurity.com/xss/xss2 .php, 2002-2005.
-
(2002)
Point Blank Security. The XSS blacklists, http
-
-
-
16
-
-
0016555241
-
The protection of information in computer systems
-
Sept
-
J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceeding of the IEEE, 63(9):1278-1308, Sept. 1975.
-
(1975)
Proceeding of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
19
-
-
33846534706
-
-
Symantec Corp, June
-
Symantec Corp. JS.Yamanner@m. Symantec Security Response, http://www.Symantec.com/security_response/writeup.jsp?docid=2006-061211-4111-99, June 2006.
-
(2006)
JS.Yamanner@m. Symantec Security Response
-
-
-
20
-
-
24644446108
-
Towards a type system for analyzing JavaScript programs
-
Edinburgh, UK, Apr
-
P. Thiemann. Towards a type system for analyzing JavaScript programs. In Proc. 14th European Symposium on Programming, pages 408-422, Edinburgh, UK, Apr. 2005.
-
(2005)
Proc. 14th European Symposium on Programming
, pp. 408-422
-
-
Thiemann, P.1
-
22
-
-
0027836576
-
Efficient software-based fault isolation
-
Asheville, NC
-
R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham. Efficient software-based fault isolation. In Proc. 14th ACM Symposium on Operating Systems Principles, pages 203-216, Asheville, NC, 1993.
-
(1993)
Proc. 14th ACM Symposium on Operating Systems Principles
, pp. 203-216
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.E.3
Graham, S.L.4
-
24
-
-
84910681237
-
Static detection of security vulnerabilities in scripting languages
-
Vancouver, B.C, Canada, July
-
Y. Xie and A. Aiken. Static detection of security vulnerabilities in scripting languages. In Proc. 15th USENIX Security Symposium, Vancouver, B.C., Canada, July 2006.
-
(2006)
Proc. 15th USENIX Security Symposium
-
-
Xie, Y.1
Aiken, A.2
|