메뉴 건너뛰기




Volumn , Issue , 2008, Pages 186-191

Web application attack prevention for tiered internet services

Author keywords

Cross site scripting; Dynamic checking compiler; Information flow tracking; SQL injection; Taint analysis; Web application security

Indexed keywords

CROSS-SITE SCRIPTING; DYNAMIC CHECKING COMPILER; INFORMATION FLOW TRACKING; SQL INJECTION; TAINT ANALYSIS; WEB APPLICATION SECURITY;

EID: 55349097140     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IAS.2008.62     Document Type: Conference Paper
Times cited : (5)

References (25)
  • 4
    • 55349113380 scopus 로고    scopus 로고
    • Reusing mshtml. MSDN Library, Microsoft Corporation
    • Reusing mshtml. MSDN Library, Microsoft Corporation.
  • 5
    • 85027202142 scopus 로고    scopus 로고
    • Web application firewall. http://www.cgisecurity.com/questions/ webappfirewall.shtml.
    • Web application firewall
  • 8
    • 0003965705 scopus 로고    scopus 로고
    • Document object model (dom) level 1 specification. W3C Recommendation
    • Technical Report REC-DOM-Level-1-19981001
    • Document object model (dom) level 1 specification. W3C Recommendation, Technical Report REC-DOM-Level-1-19981001, 1998.
    • (1998)
  • 9
    • 33745653593 scopus 로고    scopus 로고
    • An NGSSoftware Insight Security Research (NISR) Publication, June
    • C. Anley. Advanced sql injection. An NGSSoftware Insight Security Research (NISR) Publication, June 2002.
    • (2002) Advanced sql injection
    • Anley, C.1
  • 11
    • 39049160206 scopus 로고    scopus 로고
    • L. chung Lam and T. cker Chiueh. A general dynamic information flow tracking framework for security applications. In Proceedings of 22st Annual Computer Security Applications Conference (ACSAC 2006), December 2006.
    • L. chung Lam and T. cker Chiueh. A general dynamic information flow tracking framework for security applications. In Proceedings of 22st Annual Computer Security Applications Conference (ACSAC 2006), December 2006.
  • 13
    • 33845414042 scopus 로고    scopus 로고
    • P. Efstathopoulos, M. Krohn, S. VanDeBogart, C. Frey, D. Ziegler, E. Kohler, D. Mazires, F. Kaashoek, and R. Morris. Labels and event processes in the asbestos operating system. In Proceedings of the 20th ACM Symposium on Operating Systems Principles, pages 17-30, October 2005.
    • P. Efstathopoulos, M. Krohn, S. VanDeBogart, C. Frey, D. Ziegler, E. Kohler, D. Mazires, F. Kaashoek, and R. Morris. Labels and event processes in the asbestos operating system. In Proceedings of the 20th ACM Symposium on Operating Systems Principles, pages 17-30, October 2005.
  • 14
    • 55349137553 scopus 로고    scopus 로고
    • D. Mosberger and T. Jin. httperf: A tool for measuring web server performance, In Internet Server Performance Workshop, pages 59-67, June 1998.
    • D. Mosberger and T. Jin. httperf: A tool for measuring web server performance, In Internet Server Performance Workshop, pages 59-67, June 1998.
  • 17
    • 84871349041 scopus 로고    scopus 로고
    • A. Nguyen-Tuong, S. Guarnieri, D. Greene, J. Shirley, andD. Evans. Automatically hardening web applications using precise tainting. 20th IFIP International Information Security Conference (SEC 2005), 30 May- 1 June 2005.
    • A. Nguyen-Tuong, S. Guarnieri, D. Greene, J. Shirley, andD. Evans. Automatically hardening web applications using precise tainting. 20th IFIP International Information Security Conference (SEC 2005), 30 May- 1 June 2005.
  • 19
    • 55349117948 scopus 로고    scopus 로고
    • J. Rafail. Cross-site scripting vulnerabilities. CERT Advisory Archieves
    • J. Rafail. Cross-site scripting vulnerabilities. CERT Advisory Archieves.
  • 20
    • 38849110791 scopus 로고    scopus 로고
    • The essence of command injection attacks in web applications
    • January 11-13
    • Z. Su and G. Wassermann. The essence of command injection attacks in web applications. In Proceedings of POPL'06, January 11-13 2006.
    • (2006) Proceedings of POPL'06
    • Su, Z.1    Wassermann, G.2
  • 23
    • 85038810709 scopus 로고    scopus 로고
    • Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
    • August
    • W. Xu, S. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. 15th USENIX Security Symposium, August 2006.
    • (2006) 15th USENIX Security Symposium
    • Xu, W.1    Bhatkar, S.2    Sekar, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.