메뉴 건너뛰기




Volumn 3, Issue , 2007, Pages 1164-1169

XSS application worms: New Internet infestation and optimized protective measures

Author keywords

Application level web security; Component based design; Security vulnerabilities

Indexed keywords

BANDWIDTH; COMPUTER APPLICATIONS; MULTIPROCESSING SYSTEMS; OPTIMIZATION; SECURITY OF DATA; USER INTERFACES;

EID: 35148824612     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SNPD.2007.573     Document Type: Conference Paper
Times cited : (5)

References (9)
  • 1
    • 14944340027 scopus 로고    scopus 로고
    • G. A. Di Lucca, A. R. Fasolino, M. Mastoianni, P. Tramontana, Identifying Cross Site Scripting Vulnerabilities in Web Applications, wse, pp. 71-80, Sixth IEEE International Workshop on Web Site Evolution(WSE'04), 2004
    • G. A. Di Lucca, A. R. Fasolino, M. Mastoianni, P. Tramontana, "Identifying Cross Site Scripting Vulnerabilities in Web Applications," wse, pp. 71-80, Sixth IEEE International Workshop on Web Site Evolution(WSE'04), 2004
  • 2
    • 35148825981 scopus 로고    scopus 로고
    • Jesse James Garrett, Ajax: A New Approach to Web Applications, available at http://www.adaptivepath.com/publications/ essays/archives/00038S.php (Adaptive Path, February 2005), last accessed Feb 12th, 2006.
    • Jesse James Garrett, "Ajax: A New Approach to Web Applications," available at http://www.adaptivepath.com/publications/ essays/archives/00038S.php (Adaptive Path, February 2005), last accessed Feb 12th, 2006.
  • 3
    • 33646930633 scopus 로고    scopus 로고
    • Kehh Smith, Simplifying Ajax-Style Web Development, Computer, 39, no. S, pp. 98-101, May, 2006.
    • [3]Kehh Smith, "Simplifying Ajax-Style Web Development," Computer, vol. 39, no. S, pp. 98-101, May, 2006.
  • 4
    • 77953069969 scopus 로고    scopus 로고
    • Abstracting Application-Level Web Security
    • World Wide Web, Honolulu, Hawaii, May 17-22
    • [4]Scott, D., Sharp, R. "Abstracting Application-Level Web Security." In: Proc. 1 11th Int'l Conf. World Wide Web (WWW2002), pages 396-407, Honolulu, Hawaii, May 17-22, 2002.
    • (2002) Proc. 1 11th Int'l Conf , pp. 396-407
    • Scott, D.1    Sharp, R.2
  • 5
    • 0036870155 scopus 로고    scopus 로고
    • Developing Secure Web Applications. IEEEInternet
    • Nov
    • Scott, D., Sharp, R. "Developing Secure Web Applications." IEEEInternet Computing, 6(6), 38-45, Nov 2002.
    • (2002) Computing , vol.6 , Issue.6 , pp. 38-45
    • Scott, D.1    Sharp, R.2
  • 6
    • 16244394407 scopus 로고    scopus 로고
    • Bulletproof Web Security
    • TechTarget Storage Media, May, last accessed Dec 10
    • [6]Bobbitt, M. "Bulletproof Web Security." Network Security Magazine, TechTarget Storage Media, May 2002., http://infosecuritymag. techtargetcom/2002/may/bulletproof.shtml, last accessed Dec 10, 2006
    • (2002) Network Security Magazine
    • Bobbitt, M.1
  • 7
    • 33751032654 scopus 로고    scopus 로고
    • Noxes: A Client-Side Solution for Mitigating Cross-Site Scripting Attacks
    • In The , Pages:, April 23-27
    • [7]Engin Kirda, Christopher Kruegel, Giovanni Vigna, and Nenad Jovanovic "Noxes: A Client-Side Solution for Mitigating Cross-Site Scripting Attacks" In The 21st ACM Symposium on Applied Computing (SAC 2006), Pages: 330 - 337, April 23-27, 2006.
    • (2006) 21st ACM Symposium on Applied Computing (SAC , pp. 330-337
    • Kirda, E.1    Kruegel, C.2    Vigna, G.3    Jovanovic, N.4
  • 8
    • 16244362392 scopus 로고    scopus 로고
    • Wes Masri, Andy Podgurski, David Leon, Detecting and Debugging Insecure Information Flows, issre, pp. 198-209, 15th International Symposium on Software Reliability Engineering (ISSRE'04), 2004.
    • Wes Masri, Andy Podgurski, David Leon, "Detecting and Debugging Insecure Information Flows," issre, pp. 198-209, 15th International Symposium on Software Reliability Engineering (ISSRE'04), 2004.
  • 9
    • 35148877726 scopus 로고    scopus 로고
    • Jeremiah Grossman ,WhfteHat Security founder and CTO, Presentation, Webcast, 'Top 10 Web Hack of 2006, http://www.whhehatsec.com/home/ resources/presentations/files/whiteha t_top_hacks_06_F.pdf, 17-Jan-2007, last accessed Feb 10th 2007.
    • [9]Jeremiah Grossman ,WhfteHat Security founder and CTO, Presentation, Webcast, 'Top 10 Web Hack of 2006", http://www.whhehatsec.com/home/ resources/presentations/files/whiteha t_top_hacks_06_F.pdf, 17-Jan-2007, last accessed Feb 10th 2007.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.