-
1
-
-
77953069969
-
-
Scott, D., Sharp, R. Abstracting Application-Level Web Security. In: Proc. 11th Int'l Conf. World Wide Web (WWW2002), pages 396-407, Honolulu, Hawaii, May 17-22, 2002. -8
-
Scott, D., Sharp, R. "Abstracting Application-Level Web Security." In: Proc. 11th Int'l Conf. World Wide Web (WWW2002), pages 396-407, Honolulu, Hawaii, May 17-22, 2002. -8
-
-
-
-
2
-
-
0036870155
-
Developing Secure Web Applications
-
9, Nov
-
Scott, D., Sharp, R. "Developing Secure Web Applications." IEEE Internet Computing, 6(6), 38-45, Nov 2002. -9
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.6
, pp. 38-45
-
-
Scott, D.1
Sharp, R.2
-
3
-
-
16244394407
-
Bulletproof Web Security
-
TechTarget Storage Media, May 2002, last accessed Dec 10, 2006
-
Bobbitt, M. "Bulletproof Web Security." Network Security Magazine, TechTarget Storage Media, May 2002., http://infosecuritymag. techtarget.com/2002/may/bulletproof.shtml , last accessed Dec 10, 2006
-
Network Security Magazine
-
-
Bobbitt, M.1
-
4
-
-
33751032654
-
Noxes: A Client-Side Solution for Mitigating Cross-Site Scripting Attacks
-
In The , Pages:, April 23-27
-
Engin Kirda, Christopher Kruegel, Giovanni Vigna, and Nenad Jovanovic "Noxes: A Client-Side Solution for Mitigating Cross-Site Scripting Attacks" In The 21 st ACM Symposium on Applied Computing (SAC 2006), Pages: 330-337 , April 23-27, 2006.
-
(2006)
21 st ACM Symposium on Applied Computing (SAC
, pp. 330-337
-
-
Kirda, E.1
Kruegel, C.2
Vigna, G.3
Jovanovic, N.4
-
5
-
-
46749147844
-
-
O.Ismaill.M.E.Youki.K.adobayashi, S.Yamaguch, A proposal and Implementation of Automatic Detection/Collection system for Cross-Site Scripting Vulnerability Proceeding of the 18 Internation conference on Advanced Information Networking and Application (AINA'04).
-
O.Ismaill.M.E.Youki.K.adobayashi, S.Yamaguch, " A proposal and Implementation of Automatic Detection/Collection system for Cross-Site Scripting Vulnerability" Proceeding of the 18 Internation conference on Advanced Information Networking and Application (AINA'04).
-
-
-
-
6
-
-
46749141556
-
-
CERT® Advisory CA-2000-02, Malicious HTML Tags Embedded in Client Web Requests, http://www.cert.org/advisories/CA-2000-02.html, last accessed Dec 10, 2006
-
CERT® Advisory CA-2000-02, "Malicious HTML Tags Embedded in Client Web Requests", http://www.cert.org/advisories/CA-2000-02.html, last accessed Dec 10, 2006
-
-
-
-
7
-
-
46749153690
-
Less than zero-day' threats too often overlooked, analysts warn Companies tend to focus only on patching known flaws, ignoring other threats
-
October 26
-
Jaikumar Vijayan, '"Less than zero-day' threats too often overlooked, analysts warn Companies tend to focus only on patching known flaws, ignoring other threats",Computerworld, October 26, 2006
-
(2006)
Computerworld
-
-
Vijayan, J.1
-
8
-
-
46749151245
-
-
John McCormick, Microsoft users face two zero-day threats in a week, article available at http://articles.techrepublic.com.eom/5100- 1009_11-6132973.html, 11/6/06
-
John McCormick, "Microsoft users face two zero-day threats in a week", article available at http://articles.techrepublic.com.eom/5100- 1009_11-6132973.html, 11/6/06
-
-
-
-
9
-
-
19944365247
-
Securing web application code by static analysis and runtime protection
-
New York, USA, Pages:, May 17-22
-
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung Tsai, Der-Tsai Lee, Sy-Yen Kuo, " Securing web application code by static analysis and runtime protection",. In Proceedings of International WWW Conference, New York, USA, 2004, Pages: 40-52, May 17-22, 2004.
-
(2004)
Proceedings of International WWW Conference
, pp. 40-52
-
-
Huang, Y.-W.1
Yu, F.2
Hang, C.3
Tsai, C.-H.4
Lee, D.-T.5
Kuo, S.-Y.6
-
10
-
-
33745216482
-
The essence of command injection attacks in web applications
-
Pages:, Jan 11-13
-
Zhendong Su, Gary Wassermann, "The essence of command injection attacks in web applications", Annual Symposium on Principles of Programming Languages, Conference record of the 33rd ACM SIGPLAN-SIGACT symposium on Principles of programming languages,Pages: 372-382, Jan 11-13, 2006
-
(2006)
Annual Symposium on Principles of Programming Languages, Conference record of the 33rd ACM SIGPLAN-SIGACT symposium on Principles of programming languages
, pp. 372-382
-
-
Su, Z.1
Wassermann, G.2
-
11
-
-
46749134651
-
Beirut, Lebanon, Andy Podgurski Case Western Reserve University, Cleveland, OH , "Using dynamic information flow analysis to detect attacks against applications
-
Wes Masri American University of Beirut, July
-
Wes Masri American University of Beirut, Beirut, Lebanon, Andy Podgurski Case Western Reserve University, Cleveland, OH , "Using dynamic information flow analysis to detect attacks against applications", ACM SIGSOFT Software Engineering Notes Volume 30, Issue 4 July 2005
-
(2005)
ACM SIGSOFT Software Engineering Notes
, vol.30
, Issue.4
-
-
-
13
-
-
16244362392
-
-
Wes Masri, Andy Podgurski, David Leon, Detecting and Debugging Insecure Information Flows, issre, pp. 198-209, 15th International Symposium on Software Reliability Engineering (ISSRE'04), 2004.
-
Wes Masri, Andy Podgurski, David Leon, "Detecting and Debugging Insecure Information Flows," issre, pp. 198-209, 15th International Symposium on Software Reliability Engineering (ISSRE'04), 2004.
-
-
-
-
14
-
-
46749116266
-
-
WebCohort's Application Defense Center Reports Results of Vulnerability Testing on Web Applications Only 10% of Web Applications Are Secured Against Common Hacking Techniques, February, 02, 2004, , last accessed Feb 12th, 2006.
-
WebCohort's Application Defense Center Reports Results of Vulnerability Testing on Web Applications "Only 10% of Web Applications Are Secured Against Common Hacking Techniques", February, 02, 2004, ), last accessed Feb 12th, 2006.
-
-
-
|