-
1
-
-
34948841923
-
-
JavaCC
-
JavaCC. https://javacc.dev.java.net.
-
-
-
-
2
-
-
34948814546
-
-
National Infrastructure Security Co-ordination Centre
-
National Infrastructure Security Co-ordination Centre. http://www.uniras.gov.uk/niscc/index-en.html.
-
-
-
-
3
-
-
34948860540
-
-
PHP grammar. https://javacc.dev.java.net//files/documents/17/14269/ php.jj.
-
PHP grammar
-
-
-
4
-
-
34948897996
-
-
U.S. Department of Energy
-
U.S. Department of Energy. http://www.ciac.org/ciac/CIACHome.htm.
-
-
-
-
5
-
-
34948885075
-
-
mySql. http://dev.mysql.com/doc.
-
-
-
mySql1
-
6
-
-
34948853218
-
-
Php. http://www.php.net/manual.
-
-
-
Php1
-
7
-
-
34948874184
-
-
phpBB. http://www.phpbb.com.
-
-
-
phpBB1
-
8
-
-
34948843512
-
-
phpBB archive. http://www.phpbb.com/phpBB/viewtopic.php?t=113826.
-
phpBB archive. http://www.phpbb.com/phpBB/viewtopic.php?t=113826.
-
-
-
-
9
-
-
34948813545
-
-
phpBB security. http://www.securityfocus.com/bid/7932.
-
phpBB security. http://www.securityfocus.com/bid/7932.
-
-
-
-
10
-
-
34948885596
-
-
XPath. http://www.w3.org/TR/xpath.
-
XPath. http://www.w3.org/TR/xpath.
-
-
-
-
11
-
-
33745653593
-
Advanced SQL injection
-
Technical report. NGSSoftware Insight Security Research
-
C. Anley. Advanced SQL injection. In Technical report. NGSSoftware Insight Security Research, 2002.
-
(2002)
-
-
Anley, C.1
-
13
-
-
34547305805
-
A feedback based quality assessment to support open source software evolution: The grass case study
-
IEEE Computer Society Press, to appear
-
S. Bouktif, G. Antoniol, and E. Merlo. A feedback based quality assessment to support open source software evolution: the grass case study. In Proceedings of IEEE International Conference on Software Maintenance. IEEE Computer Society Press, 2006 (to appear).
-
(2006)
Proceedings of IEEE International Conference on Software Maintenance
-
-
Bouktif, S.1
Antoniol, G.2
Merlo, E.3
-
14
-
-
35048851186
-
SQLrand: Preventing SQL injection attacks
-
Proc. of the 2nd Applied Cryptography and Network Security (ACNS) Conference, Springer-Verlag
-
S. W. Boyd and A. D. Keromytis. SQLrand: Preventing SQL injection attacks. In Proc. of the 2nd Applied Cryptography and Network Security (ACNS) Conference, volume 3089, pages 292-304. Lecture Notes in Computer Science, Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3089
, pp. 292-304
-
-
Boyd, S.W.1
Keromytis, A.D.2
-
15
-
-
77953855187
-
Using parse tree validation to prevent SQL injection attacks
-
ACM Press
-
G. T. Buehrer, B. W. Weide, and P. A. G. Sivilotti. Using parse tree validation to prevent SQL injection attacks. In 5th international workshop on Software engineering and middleware, SIGSOFT: ACM Special Interest Group on Software Engineering, pages 106 - 113. ACM Press, 2005.
-
(2005)
5th international workshop on Software engineering and middleware, SIGSOFT: ACM Special Interest Group on Software Engineering
, pp. 106-113
-
-
Buehrer, G.T.1
Weide, B.W.2
Sivilotti, P.A.G.3
-
16
-
-
35248891044
-
Precise analysis of string expressions
-
Springer-Verlag, June
-
A. S. Christensen, A. Moller, and M. I. Schwartzbach. Precise analysis of string expressions. In Proc. of the 10th International Static Analysis Symposium, SAS, pages 1-18. Springer-Verlag, June 2003.
-
(2003)
Proc. of the 10th International Static Analysis Symposium, SAS
, pp. 1-18
-
-
Christensen, A.S.1
Moller, A.2
Schwartzbach, M.I.3
-
18
-
-
0016949746
-
A lattice model of secure information flow
-
D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
25
-
-
33646437001
-
New threats and attacks on the world wide web
-
T. Holz, S. Marechal, and E Raynal. New threats and attacks on the world wide web. IEEE Security and Privacy Magazine, 4(2):72-75, 2006.
-
(2006)
IEEE Security and Privacy Magazine
, vol.4
, Issue.2
, pp. 72-75
-
-
Holz, T.1
Marechal, S.2
Raynal, E.3
-
26
-
-
19944365247
-
Securing web application code by static analysis and runtime protection
-
May
-
Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D. T. Lee, and S.-Y. Kuo. Securing web application code by static analysis and runtime protection. In Proc. of the 12th International World Wide Web Conference (WWW), May 2004.
-
(2004)
Proc. of the 12th International World Wide Web Conference (WWW)
-
-
Huang, Y.-W.1
Yu, F.2
Hang, C.3
Tsai, C.-H.4
Lee, D.T.5
Kuo, S.-Y.6
-
27
-
-
27844543023
-
Insider threat study: Computer system sabotage in critical infrastructure sectors
-
Technical report, United States Secret Service and CERT Coordination Center/SEI, May
-
M. Keeney, D. Cappelli, E. Kowalski, A. Moore, T. Shimeall, and S. Rogers. Insider threat study: Computer system sabotage in critical infrastructure sectors. Technical report, United States Secret Service and CERT Coordination Center/SEI, May 2005.
-
(2005)
-
-
Keeney, M.1
Cappelli, D.2
Kowalski, E.3
Moore, A.4
Shimeall, T.5
Rogers, S.6
-
28
-
-
35248842644
-
Scaling Java points-to analysis using Spark
-
G. Hedin, editor, Compiler Construction, 12th International Conference, of, Warsaw, Poland, April, Springer-Verlag
-
O. Lhoták and L. Hendren. Scaling Java points-to analysis using Spark. In G. Hedin, editor, Compiler Construction, 12th International Conference, volume 2622 of LNCS, pages 153-169, Warsaw, Poland, April 2003. Springer-Verlag.
-
(2003)
LNCS
, vol.2622
, pp. 153-169
-
-
Lhoták, O.1
Hendren, L.2
-
31
-
-
34948846077
-
Insider threat resistant SQL-injection prevention in PHP
-
Technical Report EPM-RT-2006-04, Ecole Polytechnique de Montreal, April
-
E. Merlo, D. Letarte, and G. Antoniol. Insider threat resistant SQL-injection prevention in PHP. Technical Report EPM-RT-2006-04, Ecole Polytechnique de Montreal, http://www.polymtl.ca/biblio, April 2006.
-
(2006)
-
-
Merlo, E.1
Letarte, D.2
Antoniol, G.3
-
32
-
-
13844296853
-
Parameterized object sensitivity for points-to analysis for java
-
January
-
A. Milanova, A. Rountev, and B. G. Ryder. Parameterized object sensitivity for points-to analysis for java. ACM Transactions on Software Engineering and Methodology, 14(1):1-41, January 2005.
-
(2005)
ACM Transactions on Software Engineering and Methodology
, vol.14
, Issue.1
, pp. 1-41
-
-
Milanova, A.1
Rountev, A.2
Ryder, B.G.3
-
36
-
-
18844437024
-
Detection of injected, dynamically generated, and obfuscated malicious code
-
ACM Press
-
J. C. Rabek, R. I. Khazan, S. M. Lewandowski, and R. K. Cunningham. Detection of injected, dynamically generated, and obfuscated malicious code. In ACM Workshop on Rapid Malcode (WORM), pages 76-82. ACM Press, 2003.
-
(2003)
ACM Workshop on Rapid Malcode (WORM)
, pp. 76-82
-
-
Rabek, J.C.1
Khazan, R.I.2
Lewandowski, S.M.3
Cunningham, R.K.4
-
37
-
-
32644465248
-
Insider threat study: Illicit cyber activity in the banking and finance sector
-
Technical report, United States Secret Service and CERT Coordination Center/SEI, August
-
M. R. Randazzo, D. Cappelli, M. Keeney, A. Moore, and E. Kowalski. Insider threat study: Illicit cyber activity in the banking and finance sector. Technical report, United States Secret Service and CERT Coordination Center/SEI, August 2004.
-
(2004)
-
-
Randazzo, M.R.1
Cappelli, D.2
Keeney, M.3
Moore, A.4
Kowalski, E.5
-
38
-
-
0032295876
-
Program analysis via graph reachability
-
T. Reps. Program analysis via graph reachability. Information and Software Technology, 40(11-12):701-726, 1998.
-
(1998)
Information and Software Technology
, vol.40
, Issue.11-12
, pp. 701-726
-
-
Reps, T.1
-
40
-
-
0000990322
-
A survey of program slicing techniques
-
R Tip. A survey of program slicing techniques. Journal of Programming Languages, 3(3):121-189, 1995.
-
(1995)
Journal of Programming Languages
, vol.3
, Issue.3
, pp. 121-189
-
-
Tip, R.1
-
41
-
-
0030649003
-
Flow insensitive c++ pointers and polymorphism analysis and its application to slicing
-
P. Tonella, G. Antoniol, R. Fiutem, and E. Merlo. Flow insensitive c++ pointers and polymorphism analysis and its application to slicing. Proc. of the Int. Conf. on Software Engineering, pages 433-443, 1997.
-
(1997)
Proc. of the Int. Conf. on Software Engineering
, pp. 433-443
-
-
Tonella, P.1
Antoniol, G.2
Fiutem, R.3
Merlo, E.4
-
43
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(3):167-187, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
|