메뉴 건너뛰기




Volumn , Issue , 2007, Pages 25-35

Multi-module vulnerability analysis of web-based applications

Author keywords

Dynamic analysis; Multi step attacks; Static analysis; Vulnerability analysis; Web applications

Indexed keywords

ANALYSIS APPROACH; APPLICATION LOGIC; APPLICATION MODULE; BACK-END DATABASE; CODE MODULES; CRITICAL ENVIRONMENT; CRITICAL SERVICE; INTER-MODULE; MILITARY SYSTEMS; MULTI-STEP ATTACKS; PROTOTYPE TOOLS; SCRIPTING LANGUAGES; SECURITY PROBLEMS; VULNERABILITY ANALYSIS; WEB APPLICATION; WEB APPLICATION VULNERABILITY; WEB APPLICATIONS; WEB-BASED APPLICATIONS; WEB-BASED ATTACKS;

EID: 49949096891     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1315245.1315250     Document Type: Conference Paper
Times cited : (90)

References (22)
  • 4
    • 77952377943 scopus 로고    scopus 로고
    • Common Vulnerabilities and Exposures
    • Common Vulnerabilities and Exposures. http://www.cve.mitre.org/, 2006.
    • (2006)
  • 9
    • 33751027156 scopus 로고    scopus 로고
    • Pixy: A static analysis tool for detecting web application vulnerabilities (Short paper)
    • DOI 10.1109/SP.2006.29, 1624016, Proceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006
    • N. Jovanovic, C. Kruegel, and E. Kirda. Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities. In Proceedings of the IEEE Symposium on Security and Privacy, pages 258-263, May 2006. (Pubitemid 44753727)
    • (2006) Proceedings - IEEE Symposium on Security and Privacy , vol.2006 , pp. 258-263
    • Jovanovic, N.1    Kruegel, C.2    Kirda, E.3
  • 14
    • 84923564816 scopus 로고    scopus 로고
    • Finding security vulnerabilities in Java applications with static analysis
    • August
    • B. Livshits and M. Lam. Finding Security Vulnerabilities in Java Applications with Static Analysis. In Proceedings of the USENIX Security Symposium (USENIX'05), pages 271-286, August 2005.
    • (2005) Proceedings of the USENIX Security Symposium (USENIX'05) , pp. 271-286
    • Livshits, B.1    Lam, M.2
  • 17
    • 77952401018 scopus 로고    scopus 로고
    • November
    • I. Ristic. ModSecurity. http://www.modsecurity.org/, November 2006.
    • (2006) ModSecurity
    • Ristic, I.1
  • 19
    • 0002823436 scopus 로고
    • Two approaches to interprocedural data flow analysis
    • N. Jones and S. Muchnick, editors, chapter 7. Prentice Hall
    • M. Sharir and A. Pnueli. Two Approaches to Interprocedural Data Flow Analysis. In N. Jones and S. Muchnick, editors, Program Flow Analysis: Theory and Applications, chapter 7. Prentice Hall, 1981.
    • (1981) Program Flow Analysis: Theory and Applications
    • Sharir, M.1    Pnueli, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.