메뉴 건너뛰기




Volumn , Issue , 2007, Pages 815-818

How to counter control flow tampering attacks

Author keywords

[No Author keywords available]

Indexed keywords

ACCESSIBILITY; BUSINESS ACTIVITIES; MALICIOUS USERS; WEB APPLICATIONS;

EID: 36248941952     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AICCSA.2007.370726     Document Type: Conference Paper
Times cited : (1)

References (9)
  • 2
    • 84858896305 scopus 로고    scopus 로고
    • Web Application Security Consortium:, URL
    • Web Application Security Consortium: Threat Classification, URL:http://www.webappsec.org/projects/threat/vl/WASC-TCvl_0.pdf, 2004.
    • (2004) Threat Classification
  • 5
    • 84858457975 scopus 로고    scopus 로고
    • Open Web Application Security Project, WebScarab Project
    • Open Web Application Security Project, WebScarab Project, www.owasp.org, 2006.
    • (2006)
  • 7
    • 84858455425 scopus 로고    scopus 로고
    • URL:, http://httpunit.sourceforge.net
    • Httpunit, URL: http://httpunit.sourceforge.net.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.