-
1
-
-
50249115131
-
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications
-
Balzarotti, D., Cova, M., Felmetsger, V., Jovanovic, N., Kirda, E., Kruegel, C., Vigna, G.: Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications, In: Proc. Symposium on Security and Privacy (2008)
-
(2008)
Proc. Symposium on Security and Privacy
-
-
Balzarotti, D.1
Cova, M.2
Felmetsger, V.3
Jovanovic, N.4
Kirda, E.5
Kruegel, C.6
Vigna, G.7
-
2
-
-
49949096891
-
-
Balzarotti. D., Cova, M.. Felmetsger, V., Vigna, G.: Multi-module vulnerability analysis of web-based applications. In: Proc. 14th ACM conference on Computer and communications security, pp. 25-35. ACM, New York (2007)
-
Balzarotti. D., Cova, M.. Felmetsger, V., Vigna, G.: Multi-module vulnerability analysis of web-based applications. In: Proc. 14th ACM conference on Computer and communications security, pp. 25-35. ACM, New York (2007)
-
-
-
-
4
-
-
84895065395
-
-
Biehl, M., Klarlund, N., Rauhe, T.: Algorithms for guided tree automata. In: Raymond, D.R., Yu, S., Wood, D. (eds.) WIA 1996. LNCS, 1260. Springer, Heidelberg (1997)
-
Biehl, M., Klarlund, N., Rauhe, T.: Algorithms for guided tree automata. In: Raymond, D.R., Yu, S., Wood, D. (eds.) WIA 1996. LNCS, vol. 1260. Springer, Heidelberg (1997)
-
-
-
-
5
-
-
84944413844
-
Regular model checking
-
Bouajjani, A., Jonsson, B., Nilsson, M., Touili, T.: Regular model checking. In: Proc. 12th International Conference on Computer Aided Verification, pp. 403-418 (2000)
-
(2000)
Proc. 12th International Conference on Computer Aided Verification
, pp. 403-418
-
-
Bouajjani, A.1
Jonsson, B.2
Nilsson, M.3
Touili, T.4
-
6
-
-
33845934486
-
-
Choi, T.-H., Lee, O., Kim, H., Doh, K.-G.: A practical string analyzer by the widening approach. In: Kobayashi, N. (ed.) APLAS 2006. LNCS, 4279, pp. 374-388. Springer, Heidelberg (2006)
-
Choi, T.-H., Lee, O., Kim, H., Doh, K.-G.: A practical string analyzer by the widening approach. In: Kobayashi, N. (ed.) APLAS 2006. LNCS, vol. 4279, pp. 374-388. Springer, Heidelberg (2006)
-
-
-
-
7
-
-
35248891044
-
-
Christensen, A.S., Møller, A., Schwartzbach, M.I.: Precise analysis of string expressions. In: Cousot, R. (ed.) SAS 2003. LNCS, 2694, pp. 1-18. Springer, Heidelberg (2003)
-
Christensen, A.S., Møller, A., Schwartzbach, M.I.: Precise analysis of string expressions. In: Cousot, R. (ed.) SAS 2003. LNCS, vol. 2694, pp. 1-18. Springer, Heidelberg (2003)
-
-
-
-
8
-
-
84866655092
-
String analysis for x86 binaries
-
September, ACM Press, New York () 2005
-
Christodorescu. M., Kidd, N., Goh, W.-H.: String analysis for x86 binaries. In: Proc. 6th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering (PASTE 2005), September 2005, ACM Press, New York (2005)
-
(2005)
Proc. 6th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering (PASTE
-
-
Christodorescu, M.1
Kidd, N.2
Goh, W.-H.3
-
9
-
-
37349043549
-
-
Fu, X, Lu, X, Peltsverger, B, Chen, S, Qian, K, Tao, L, A static analysis framework for detecting sql injection vulnerabilities. In: Proc. 31st Annual International Computer Software and Applications Conference. COMPSAC 2007, Washington, DC, USA, 1. pp. 87-96. IEEE Computer Society, Los Alamitos 2007
-
Fu, X., Lu, X., Peltsverger, B., Chen, S., Qian, K., Tao, L.: A static analysis framework for detecting sql injection vulnerabilities. In: Proc. 31st Annual International Computer Software and Applications Conference. COMPSAC 2007, Washington, DC, USA, vol. 1. pp. 87-96. IEEE Computer Society, Los Alamitos (2007)
-
-
-
-
11
-
-
4544280668
-
Static checking of dynamically generated queries in database applications
-
Gould, C., Su, Z., Devanbu, P.: Static checking of dynamically generated queries in database applications. In: Proc. 26th International Conference on Software Engineering, pp. 645-654 (2004)
-
(2004)
Proc. 26th International Conference on Software Engineering
, pp. 645-654
-
-
Gould, C.1
Su, Z.2
Devanbu, P.3
-
15
-
-
48049109004
-
Abstracting symbolic execution with string analysis
-
Washington, DC, USA, pp, IEEE Computer Society, Los Alamitos
-
Shannon, D., Hajra, S., Lee, A., Zhan, D., Khurshid, S.: Abstracting symbolic execution with string analysis. In: Proc. Testing: Academic and Industrial Conference Practice and Research Techniques - MUTATION, Washington, DC, USA, pp. 13-22. IEEE Computer Society, Los Alamitos (2007)
-
(2007)
Proc. Testing: Academic and Industrial Conference Practice and Research Techniques - MUTATION
, pp. 13-22
-
-
Shannon, D.1
Hajra, S.2
Lee, A.3
Zhan, D.4
Khurshid, S.5
-
17
-
-
54249123721
-
-
van Noord, G., Gerdemann, D.: An extendible regular expression compiler for finite-state approaches in natural language processing. In: Proc. of the 4th International Workshop on Implementing Automata (WIA), July 1999, pp. 122-139. Springer, Heidelberg (1999)
-
van Noord, G., Gerdemann, D.: An extendible regular expression compiler for finite-state approaches in natural language processing. In: Proc. of the 4th International Workshop on Implementing Automata (WIA), July 1999, pp. 122-139. Springer, Heidelberg (1999)
-
-
-
-
19
-
-
84910681237
-
Static detection of security vulnerabilities in scripting languages
-
Berkeley, CA, USA, p, USENIX Association
-
Xie, Y., Aiken, A.: Static detection of security vulnerabilities in scripting languages. In: Proc. 15th conference on USENIX Security Symposium, Berkeley, CA, USA, p. 13. USENIX Association (2006)
-
(2006)
Proc. 15th conference on USENIX Security Symposium
, pp. 13
-
-
Xie, Y.1
Aiken, A.2
|