메뉴 건너뛰기




Volumn 5156 LNCS, Issue , 2008, Pages 306-324

Symbolic string verification: An automata-based approach

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATIONS.; CONSERVATIVE APPROXIMATIONS; DETERMINIZATION; EFFICIENT; FIXPOINT COMPUTATIONS; NOVEL ALGORITHMS; PROGRAM EXECUTIONS; PROGRAM POINTS; PROGRAMMING ERRORS; REGULAR EXPRESSIONS; REPLACEMENT FUNCTIONS; SANITIZATION; SECURITY VULNERABILITIES; STATIC ANALYSIS TECHNIQUES; STRING ANALYSES; WIDENING OPERATORS;

EID: 54249102273     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-85114-1_21     Document Type: Conference Paper
Times cited : (61)

References (19)
  • 2
    • 49949096891 scopus 로고    scopus 로고
    • Balzarotti. D., Cova, M.. Felmetsger, V., Vigna, G.: Multi-module vulnerability analysis of web-based applications. In: Proc. 14th ACM conference on Computer and communications security, pp. 25-35. ACM, New York (2007)
    • Balzarotti. D., Cova, M.. Felmetsger, V., Vigna, G.: Multi-module vulnerability analysis of web-based applications. In: Proc. 14th ACM conference on Computer and communications security, pp. 25-35. ACM, New York (2007)
  • 4
    • 84895065395 scopus 로고    scopus 로고
    • Biehl, M., Klarlund, N., Rauhe, T.: Algorithms for guided tree automata. In: Raymond, D.R., Yu, S., Wood, D. (eds.) WIA 1996. LNCS, 1260. Springer, Heidelberg (1997)
    • Biehl, M., Klarlund, N., Rauhe, T.: Algorithms for guided tree automata. In: Raymond, D.R., Yu, S., Wood, D. (eds.) WIA 1996. LNCS, vol. 1260. Springer, Heidelberg (1997)
  • 6
    • 33845934486 scopus 로고    scopus 로고
    • Choi, T.-H., Lee, O., Kim, H., Doh, K.-G.: A practical string analyzer by the widening approach. In: Kobayashi, N. (ed.) APLAS 2006. LNCS, 4279, pp. 374-388. Springer, Heidelberg (2006)
    • Choi, T.-H., Lee, O., Kim, H., Doh, K.-G.: A practical string analyzer by the widening approach. In: Kobayashi, N. (ed.) APLAS 2006. LNCS, vol. 4279, pp. 374-388. Springer, Heidelberg (2006)
  • 7
    • 35248891044 scopus 로고    scopus 로고
    • Christensen, A.S., Møller, A., Schwartzbach, M.I.: Precise analysis of string expressions. In: Cousot, R. (ed.) SAS 2003. LNCS, 2694, pp. 1-18. Springer, Heidelberg (2003)
    • Christensen, A.S., Møller, A., Schwartzbach, M.I.: Precise analysis of string expressions. In: Cousot, R. (ed.) SAS 2003. LNCS, vol. 2694, pp. 1-18. Springer, Heidelberg (2003)
  • 9
    • 37349043549 scopus 로고    scopus 로고
    • Fu, X, Lu, X, Peltsverger, B, Chen, S, Qian, K, Tao, L, A static analysis framework for detecting sql injection vulnerabilities. In: Proc. 31st Annual International Computer Software and Applications Conference. COMPSAC 2007, Washington, DC, USA, 1. pp. 87-96. IEEE Computer Society, Los Alamitos 2007
    • Fu, X., Lu, X., Peltsverger, B., Chen, S., Qian, K., Tao, L.: A static analysis framework for detecting sql injection vulnerabilities. In: Proc. 31st Annual International Computer Software and Applications Conference. COMPSAC 2007, Washington, DC, USA, vol. 1. pp. 87-96. IEEE Computer Society, Los Alamitos (2007)
  • 17
    • 54249123721 scopus 로고    scopus 로고
    • van Noord, G., Gerdemann, D.: An extendible regular expression compiler for finite-state approaches in natural language processing. In: Proc. of the 4th International Workshop on Implementing Automata (WIA), July 1999, pp. 122-139. Springer, Heidelberg (1999)
    • van Noord, G., Gerdemann, D.: An extendible regular expression compiler for finite-state approaches in natural language processing. In: Proc. of the 4th International Workshop on Implementing Automata (WIA), July 1999, pp. 122-139. Springer, Heidelberg (1999)
  • 19
    • 84910681237 scopus 로고    scopus 로고
    • Static detection of security vulnerabilities in scripting languages
    • Berkeley, CA, USA, p, USENIX Association
    • Xie, Y., Aiken, A.: Static detection of security vulnerabilities in scripting languages. In: Proc. 15th conference on USENIX Security Symposium, Berkeley, CA, USA, p. 13. USENIX Association (2006)
    • (2006) Proc. 15th conference on USENIX Security Symposium , pp. 13
    • Xie, Y.1    Aiken, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.