-
1
-
-
16644366310
-
SQLrand: Preventing SQL injection attacks
-
International Conference on Applied Cryptography and Network Security ACNS
-
S. W. Boyd and A. D. Keromytis. SQLrand: Preventing SQL injection attacks. In International Conference on Applied Cryptography and Network Security (ACNS), LNCS, volume 2, 2004.
-
(2004)
LNCS
, vol.2
-
-
Boyd, S.W.1
Keromytis, A.D.2
-
3
-
-
35248891044
-
Precise analysis of string expressions
-
Proceedings of the 10th International Static Analysis Symposium, SAS '03, of, Springer-Verlag, June 2003. Available from
-
A. S. Christensen, A. Møller, and M. I. Schwartzbach. Precise analysis of string expressions. In Proceedings of the 10th International Static Analysis Symposium, SAS '03, volume 2694 of LNCS, pages 1-18. Springer-Verlag, June 2003. Available from http://www.brics.dk/JSA/.
-
LNCS
, vol.2694
, pp. 1-18
-
-
Christensen, A.S.1
Møller, A.2
Schwartzbach, M.I.3
-
5
-
-
0036036247
-
Flow-sensitive type qualifiers
-
New York, NY, USA, ACM Press
-
J. S. Foster, T. Terauchi, and A. Aiken. Flow-sensitive type qualifiers. In PLDI '02: Proceedings of the ACM SIGPLAN 2002 Conference on Programming language design and implementation, pages 1-12, New York, NY, USA, 2002. ACM Press.
-
(2002)
PLDI '02: Proceedings of the ACM SIGPLAN 2002 Conference on Programming language design and implementation
, pp. 1-12
-
-
Foster, J.S.1
Terauchi, T.2
Aiken, A.3
-
7
-
-
34547379435
-
Using Positive Tainting and Syntax-Aware Evaluation to Counter SQL Injection Attacks
-
Portland, Oregon, November
-
W. Halfond, A. Orso, and P. Manolios. Using Positive Tainting and Syntax-Aware Evaluation to Counter SQL Injection Attacks. In. Proceedings of the ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE 2006), Portland, Oregon, November 2006.
-
(2006)
Proceedings of the ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE 2006)
-
-
Halfond, W.1
Orso, A.2
Manolios, P.3
-
11
-
-
19944365247
-
Securing web application code by static analysis and runtime protection
-
New York, NY, USA, ACM Press
-
Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D.-T. Lee, and S.-Y. Kuo. Securing web application code by static analysis and runtime protection. In WWW '04: Proceedings of the 13th international conference on World Wide Web, pages 40-52, New York, NY, USA, 2004. ACM Press.
-
(2004)
WWW '04: Proceedings of the 13th international conference on World Wide Web
, pp. 40-52
-
-
Huang, Y.-W.1
Yu, F.2
Hang, C.3
Tsai, C.-H.4
Lee, D.-T.5
Kuo, S.-Y.6
-
12
-
-
33751027156
-
Pixy: A static analysis tool for detecting web application vulnerabilities (short paper)
-
Oakland, CA, May
-
N. Jovanovic, C. Kruegel, and E. Kirda. Pixy: A static analysis tool for detecting web application vulnerabilities (short paper). In 2006 IEEE Symposium on Security and Privacy, Oakland, CA, May 2006.
-
(2006)
2006 IEEE Symposium on Security and Privacy
-
-
Jovanovic, N.1
Kruegel, C.2
Kirda, E.3
-
13
-
-
33745934031
-
Precise alias analysis for syntactic detection of web application vulnerabilities
-
Ottowa, Canada, June
-
N. Jovanovic, C. Kruegel, and E. Kirda. Precise alias analysis for syntactic detection of web application vulnerabilities. In ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, Ottowa, Canada, June 2006.
-
(2006)
ACM SIGPLAN Workshop on Programming Languages and Analysis for Security
-
-
Jovanovic, N.1
Kruegel, C.2
Kirda, E.3
-
14
-
-
14844317200
-
Countering code-injection attacks with instruction-set randomization
-
G. S. Kc, A. D. Keromytis, and V. Prevelakis. Countering code-injection attacks with instruction-set randomization. In Proc. CCS'03, pages 272-280, 2003.
-
(2003)
Proc. CCS'03
, pp. 272-280
-
-
Kc, G.S.1
Keromytis, A.D.2
Prevelakis, V.3
-
16
-
-
33244495360
-
Context-sensitive program analysis as database queries
-
ACM, June
-
M. S. Lam, J. Whaley, V. B. Livshits, M. C. Martin, D. Avots, M. Carbin, and C. Unkel. Context-sensitive program analysis as database queries. In Proceedings of the Twenty-fourth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems. ACM, June 2005.
-
(2005)
Proceedings of the Twenty-fourth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems
-
-
Lam, M.S.1
Whaley, J.2
Livshits, V.B.3
Martin, M.C.4
Avots, D.5
Carbin, M.6
Unkel, C.7
-
21
-
-
0012267739
-
Regular approximation of context-free grammars through transformation
-
M. Mohri and M. Nederhof. Regular approximation of context-free grammars through transformation. Robustness in Language and Speech Technology, pages 153-163, 2001.
-
(2001)
Robustness in Language and Speech Technology
, pp. 153-163
-
-
Mohri, M.1
Nederhof, M.2
-
23
-
-
84871349041
-
Automatically hardening web applications using precise tainting
-
A. Nguyen-Tuong, S. Guarnieri, D. Greene, J. Shirley, and D. Evans. Automatically hardening web applications using precise tainting. In Twentieth IFIP International Information Security Conference (SEC'05), 2005.
-
(2005)
Twentieth IFIP International Information Security Conference (SEC'05)
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Shirley, J.4
Evans, D.5
-
25
-
-
33745811685
-
The essence of command injection attacks in web applications
-
Charleston, SC, Jan, ACM Press New York, NY, USA
-
Z. Su and G. Wassermann. The essence of command injection attacks in web applications. In Proceedings of the 33rd Annual Symposium on Principles of Programming Languages, pages 372-382, Charleston, SC, Jan, 2006. ACM Press New York, NY, USA.
-
(2006)
Proceedings of the 33rd Annual Symposium on Principles of Programming Languages
, pp. 372-382
-
-
Su, Z.1
Wassermann, G.2
-
30
-
-
4544374465
-
Cloning-based context-sensitive pointer alias analysis using binary decision diagrams
-
New York, NY, USA, ACM Press
-
J. Whaley and M. S. Lam. Cloning-based context-sensitive pointer alias analysis using binary decision diagrams. In PLDI '04: Proceedings of the ACM SIGPLAN 2004 conference on Programming language design and implementation, pages 131-144, New York, NY, USA, 2004. ACM Press.
-
(2004)
PLDI '04: Proceedings of the ACM SIGPLAN 2004 conference on Programming language design and implementation
, pp. 131-144
-
-
Whaley, J.1
Lam, M.S.2
-
31
-
-
84910681237
-
Static detection of security vulnerabilities in scripting languages
-
July
-
Y. Xie and A. Aiken. Static detection of security vulnerabilities in scripting languages. In Proceedings of the 15th USENIX Security Symposium, pages 179-192, July 2006.
-
(2006)
Proceedings of the 15th USENIX Security Symposium
, pp. 179-192
-
-
Xie, Y.1
Aiken, A.2
|