-
2
-
-
34748831643
-
Thorough, static analysis of device drivers
-
Thomas Ball, Ella Bounimova, Byron Cook, Vladimir Levin, Jakob Lichtenberg, Con McGarvey, Bohus Ondrusek, Sriram K. Rajamani, and Abdullah Ustuner. Thorough, static analysis of device drivers. In Proceedings of the European Systems Conference, 2006.
-
(2006)
Proceedings of the European Systems Conference
-
-
Ball, T.1
Bounimova, E.2
Cook, B.3
Levin, V.4
Lichtenberg, J.5
McGarvey, C.6
Ondrusek, B.7
Rajamani, S.K.8
Ustuner, A.9
-
4
-
-
84858452988
-
-
August
-
Eric Chien. Malicious Yahooligans. http://www. Symantec.com/avcenter/ reference/malicious. yahooligans. pdf, August 2006.
-
(2006)
Malicious Yahooligans
-
-
Chien, E.1
-
5
-
-
39749126595
-
-
Dojo Foundation
-
Dojo Foundation. Dojo, the JavaScript toolkit, http: //doj otoolkit. org, 2007.
-
(2007)
Dojo, the JavaScript toolkit
-
-
-
12
-
-
0036039794
-
Ben Chelf, Yichen Xie, and Dawson Engler. A system, and language for building system-specific, static analyses
-
June
-
Seth. Hallem, Ben Chelf, Yichen Xie, and Dawson Engler. A system, and language for building system-specific, static analyses. In Proceedings of the Conference on Programming Language Design and Implementation, pages 69-82, June 2002.
-
(2002)
Proceedings of the Conference on Programming Language Design and Implementation
, pp. 69-82
-
-
Seth1
Hallem2
-
14
-
-
19944365247
-
Securing Web application code by static analysis and runtime protection
-
May
-
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung Tsai, Der-Tsai Lee, and Sy-Yen Kuo. Securing Web application code by static analysis and runtime protection. In Proceedings of the Conference on World Wide Web, pages 40-52, May 2004.
-
(2004)
Proceedings of the Conference on World Wide Web
, pp. 40-52
-
-
Huang, Y.1
Yu, F.2
Hang, C.3
Tsai, C.4
Lee, D.5
Kuo, S.6
-
16
-
-
36448992024
-
Browser-enforced embedded policies
-
BEEP:, Technical report, Department of Computer Science, University of Maryland
-
Trevor Jim, Nikhil Swamy, and Michael Hicks. BEEP: Browser-enforced embedded policies. Technical report, Department of Computer Science, University of Maryland, 2006.
-
(2006)
-
-
Jim, T.1
Swamy, N.2
Hicks, M.3
-
22
-
-
33745184790
-
Finding security errors in Java programs with static analysis
-
August
-
Benjamin Livshits and Monica S. Lam. Finding security errors in Java programs with static analysis. In Proceedings of the Usenix Security Symposium, pages 271-286, August 2005.
-
(2005)
Proceedings of the Usenix Security Symposium
, pp. 271-286
-
-
Livshits, B.1
Lam, M.S.2
-
23
-
-
31744432699
-
Finding application errors and security vulnerabilities using PQL: A program, query language
-
October
-
Michael Martin, Benjamin Livshits, and Monica S. Lam. Finding application errors and security vulnerabilities using PQL: a program, query language. In Proceedings of the Conference on Object-Oriented Programming, Systems, Languages, and Applications, October 2005.
-
(2005)
Proceedings of the Conference on Object-Oriented Programming, Systems, Languages, and Applications
-
-
Martin, M.1
Livshits, B.2
Lam, M.S.3
-
24
-
-
36448963891
-
SecuriFly: Runtime vulnerability protection for Web applications
-
Technical report, Stanford University, October
-
Michael Martin, Benjamin Livshits, and Monica S. Lam. SecuriFly: Runtime vulnerability protection for Web applications. Technical report, Stanford University, October 2006.
-
(2006)
-
-
Martin, M.1
Livshits, B.2
Lam, M.S.3
-
27
-
-
84871349041
-
Automatically hardening Web applications using precise tainting
-
June
-
Ann Nguyen-Tuong, Salvatore Guarnieri, Doug Greene, Jeff Shirley, and David Evans. Automatically hardening Web applications using precise tainting. In Proceedings of the IFIP International Information Security Conference, June 2005.
-
(2005)
Proceedings of the IFIP International Information Security Conference
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Shirley, J.4
Evans, D.5
-
29
-
-
85076780225
-
BrowserShield: Vulnerability-driven filtering of dynamic HTML
-
C. Reis, J. Dunagan, H. Wang, O. Dubrovsky, and S. Esmeir. BrowserShield: Vulnerability-driven filtering of dynamic HTML. In Proceedings of Operating Systems Design and Implementation, 2006.
-
(2006)
Proceedings of Operating Systems Design and Implementation
-
-
Reis, C.1
Dunagan, J.2
Wang, H.3
Dubrovsky, O.4
Esmeir, S.5
-
31
-
-
84858469618
-
-
October
-
Samy. The Samy worm, http://namb.la/popular, October 2005.
-
(2005)
The Samy worm
-
-
Samy1
-
32
-
-
36448966076
-
-
willCode4Beer. Introducing the Dojo tree widget, http:// willcode4beer.com/ware.jsp?set=dojoTreeWidget, January 2007.
-
willCode4Beer. Introducing the Dojo tree widget, http:// willcode4beer.com/ware.jsp?set=dojoTreeWidget, January 2007.
-
-
-
-
33
-
-
33846480503
-
Static detection of security vulnerabilities in scripting languages
-
August
-
Yichen Xie and Alex Aiken. Static detection of security vulnerabilities in scripting languages. In Proceedings of the Usenix Security Symposium, pages 271-286, August 2006.
-
(2006)
Proceedings of the Usenix Security Symposium
, pp. 271-286
-
-
Xie, Y.1
Aiken, A.2
|