메뉴 건너뛰기




Volumn , Issue , 2007, Pages 32-41

Sound and precise analysis of web applications for injection vulnerabilities

Author keywords

Static analysis; String analysis; Web applications

Indexed keywords

DATABASE QUERIES; STRING ANALYSIS; WEB APPLICATIONS;

EID: 35449004893     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1250734.1250739     Document Type: Conference Paper
Times cited : (183)

References (32)
  • 1
    • 16644366310 scopus 로고    scopus 로고
    • SQLrand: Preventing SQL injection attacks
    • International Conference on Applied Cryptography and Network Security ACNS
    • S. W. Boyd and A. D. Keromytis. SQLrand: Preventing SQL injection attacks. In International Conference on Applied Cryptography and Network Security (ACNS), LNCS, volume 2, 2004.
    • (2004) LNCS , vol.2
    • Boyd, S.W.1    Keromytis, A.D.2
  • 3
    • 35248891044 scopus 로고    scopus 로고
    • Precise analysis of string expressions
    • Proceedings of the 10th International Static Analysis Symposium, SAS '03, of, Springer-Verlag, June 2003. Available from
    • A. S. Christensen, A. Møller, and M. I. Schwartzbach. Precise analysis of string expressions. In Proceedings of the 10th International Static Analysis Symposium, SAS '03, volume 2694 of LNCS, pages 1-18. Springer-Verlag, June 2003. Available from http://www.brics.dk/JSA/.
    • LNCS , vol.2694 , pp. 1-18
    • Christensen, A.S.1    Møller, A.2    Schwartzbach, M.I.3
  • 12
    • 33751027156 scopus 로고    scopus 로고
    • Pixy: A static analysis tool for detecting web application vulnerabilities (short paper)
    • Oakland, CA, May
    • N. Jovanovic, C. Kruegel, and E. Kirda. Pixy: A static analysis tool for detecting web application vulnerabilities (short paper). In 2006 IEEE Symposium on Security and Privacy, Oakland, CA, May 2006.
    • (2006) 2006 IEEE Symposium on Security and Privacy
    • Jovanovic, N.1    Kruegel, C.2    Kirda, E.3
  • 14
    • 14844317200 scopus 로고    scopus 로고
    • Countering code-injection attacks with instruction-set randomization
    • G. S. Kc, A. D. Keromytis, and V. Prevelakis. Countering code-injection attacks with instruction-set randomization. In Proc. CCS'03, pages 272-280, 2003.
    • (2003) Proc. CCS'03 , pp. 272-280
    • Kc, G.S.1    Keromytis, A.D.2    Prevelakis, V.3
  • 21
    • 0012267739 scopus 로고    scopus 로고
    • Regular approximation of context-free grammars through transformation
    • M. Mohri and M. Nederhof. Regular approximation of context-free grammars through transformation. Robustness in Language and Speech Technology, pages 153-163, 2001.
    • (2001) Robustness in Language and Speech Technology , pp. 153-163
    • Mohri, M.1    Nederhof, M.2
  • 26
  • 31
    • 84910681237 scopus 로고    scopus 로고
    • Static detection of security vulnerabilities in scripting languages
    • July
    • Y. Xie and A. Aiken. Static detection of security vulnerabilities in scripting languages. In Proceedings of the 15th USENIX Security Symposium, pages 179-192, July 2006.
    • (2006) Proceedings of the 15th USENIX Security Symposium , pp. 179-192
    • Xie, Y.1    Aiken, A.2
  • 32
    • 85038810709 scopus 로고    scopus 로고
    • Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
    • Aug
    • W. Xu, S. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. In Proceedings of the 15th USENIX Security Symposium., Aug. 2006.
    • (2006) Proceedings of the 15th USENIX Security Symposium
    • Xu, W.1    Bhatkar, S.2    Sekar, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.