-
1
-
-
37149044854
-
Jpf-se: A symbolic execution extension to java pathfinder
-
Braga, Portugal, March
-
Saswat Anand, Corina S. Pasareanu, and Willem Visser. Jpf-se: A symbolic execution extension to java pathfinder. In International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS 2007), pages 134-138, Braga, Portugal, March 2007.
-
(2007)
International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS 2007)
, pp. 134-138
-
-
Anand, S.1
Pasareanu, C.S.2
Visser, W.3
-
2
-
-
0038304275
-
Advanced SQL Injection In SQL Server Applications
-
White Paper, 2002
-
C. Anley. Advanced SQL Injection In SQL Server Applications. Next Generation Security Software LTD. White Paper, 2002.
-
Next Generation Security Software LTD
-
-
Anley, C.1
-
4
-
-
35048851186
-
SQLrand: Preventing SQL injection attacks
-
Proceedings of the 2nd Applied Cryptography and Network Security (ACNS) Conference, of, Springer
-
S. W. Boyd and A. D. Keromytis. SQLrand: Preventing SQL injection attacks. In Proceedings of the 2nd Applied Cryptography and Network Security (ACNS) Conference, volume 3089 of Lecture Notes in Computer Science, pages 292-304. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3089
, pp. 292-304
-
-
Boyd, S.W.1
Keromytis, A.D.2
-
6
-
-
57449095937
-
-
Shigeru Chiba. Java assist tutorial, http://www.csg.is.titech.ac.jp/- chiba/javassist/.
-
Shigeru Chiba. Java assist tutorial, http://www.csg.is.titech.ac.jp/- chiba/javassist/.
-
-
-
-
10
-
-
37349043549
-
-
X. Fu, X. Lu, K. Qian, B. Peltsverger, and S. Chen. A Static Analysis Framework for Detecting SQL Injection Vulnerabilities. In Proceedings of 31st Annual International Computer Software and Applications Conference COMPSAC2007, pages 87-96, 2007
-
X. Fu, X. Lu, K. Qian, B. Peltsverger, and S. Chen. A Static Analysis Framework for Detecting SQL Injection Vulnerabilities. In Proceedings of 31st Annual International Computer Software and Applications Conference (COMPSAC2007), pages 87-96, 2007.
-
-
-
-
11
-
-
57449116569
-
APOGEE - Automated Project Grading and Instant Feedback System for Web Based Computing
-
Portland, OR, March
-
X. Fu, K. Qian, B. Peltsverger, L. Tao, and J. Liu. APOGEE - Automated Project Grading and Instant Feedback System for Web Based Computing. In Proceedings of the 39th SIGCSE Technical Symposium on Computer Science Education (SIGCSE 2008), pages 77 -81, Portland, OR, March 2008.
-
(2008)
Proceedings of the 39th SIGCSE Technical Symposium on Computer Science Education (SIGCSE 2008)
, pp. 77-81
-
-
Fu, X.1
Qian, K.2
Peltsverger, B.3
Tao, L.4
Liu, J.5
-
14
-
-
35248872018
-
Generalized symbolic execution for model checking and testing
-
Proceedings of the 9th International Conference on Tools and Algorithms for the Construction and Analysis of Systems TACAS, of
-
S. Khurshid, C. S. Pasǎreǎnu, and W. Visser. Generalized symbolic execution for model checking and testing. In Proceedings of the 9th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), volume 2619 of LNCS, 2003.
-
(2003)
LNCS
, vol.2619
-
-
Khurshid, S.1
Pasǎreǎnu, C.S.2
Visser, W.3
-
15
-
-
0016971687
-
Symbolic execution and program testing
-
J. C. King. Symbolic execution and program testing. Communications of the ACM, 19(7):385-394, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.7
, pp. 385-394
-
-
King, J.C.1
-
17
-
-
84871349041
-
Automatically hardening web applications using precise tainting
-
A. Nguyen-Tuong, S. Guarnieri, D. Greene, J. Shirley, and D. Evans. Automatically hardening web applications using precise tainting. In Proceedings of the 20th IFIP International Information Security Conference, 2005.
-
(2005)
Proceedings of the 20th IFIP International Information Security Conference
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Shirley, J.4
Evans, D.5
-
18
-
-
48049109004
-
Abstracting symbolic execution with string analysis
-
September
-
D. Shannon, S. Hajra, A. Lee, D. Zhan, and S. Khurshid. Abstracting symbolic execution with string analysis. In Testing: Academic and Industrial Conference Practice and Research Techniques - MUTATION, 2007. (TAICPART-MUTATION 2007), pages 13-22, September 2007.
-
(2007)
Testing: Academic and Industrial Conference Practice and Research Techniques - MUTATION, 2007. (TAICPART-MUTATION 2007)
, pp. 13-22
-
-
Shannon, D.1
Hajra, S.2
Lee, A.3
Zhan, D.4
Khurshid, S.5
-
21
-
-
33751060454
-
Automatically generating malicious disks using symbolic execution
-
P
-
J. Yang, C. Sar, P. Twohey, C. Cadar, and D. Engler. Automatically generating malicious disks using symbolic execution. In Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006.
-
(2006)
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&
, pp. 2006
-
-
Yang, J.1
Sar, C.2
Twohey, P.3
Cadar, C.4
Engler, D.5
|