메뉴 건너뛰기




Volumn , Issue , 2009, Pages 346-355

Penetration testing with improved input vector identification

Author keywords

[No Author keywords available]

Indexed keywords

ANALYSIS TECHNIQUES; CURRENT TECHNIQUES; INPUT VECTOR; NEW APPROACHES; PENETRATION TESTING; TARGET APPLICATION; WEB APPLICATION;

EID: 67650177535     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICST.2009.26     Document Type: Conference Paper
Times cited : (46)

References (21)
  • 1
    • 22144441364 scopus 로고    scopus 로고
    • Testing Web applications by modeling with FSMs
    • DOI 10.1007/s10270-004-0077-7
    • A. A. Andrews, J. Offutt, and R. T. Alexander. Testing Web Applications by Modeling with FSMs. In Software Systems and Modeling, pages 326-345, July 2005. (Pubitemid 40984097)
    • (2005) Software and Systems Modeling , vol.4 , Issue.3 , pp. 326-345
    • Andrews, A.A.1    Offutt, J.2    Alexander, R.T.3
  • 2
    • 14744271696 scopus 로고    scopus 로고
    • Software penetration testing
    • DOI 10.1109/MSP.2005.23
    • B. Arkin, S. Stender, and G. McGraw. Software penetration testing. IEEE Security & Privacy, 3(1):84 - 87, 2005. (Pubitemid 40325588)
    • (2005) IEEE Security and Privacy , vol.3 , Issue.1 , pp. 84-87
    • Arkin, B.1    Stender, S.2    McGraw, G.3
  • 3
    • 37249006310 scopus 로고    scopus 로고
    • About penetration testing
    • M. Bishop. About Penetration Testing. IEEE Security & Privacy, 5(6):84-87, 2007.
    • (2007) IEEE Security & Privacy , vol.5 , Issue.6 , pp. 84-87
    • Bishop, M.1
  • 7
    • 21244487905 scopus 로고    scopus 로고
    • Leveraging user-session data to support web application testing
    • DOI 10.1109/TSE.2005.36
    • S. Elbaum, G. Rothermel, S. Karre, and M. F. II. Leveraging User-Session Data to Support Web Application Testing. IEEE Transactions On Software Engineering, 31(3):187- 202, March 2005. (Pubitemid 40890001)
    • (2005) IEEE Transactions on Software Engineering , vol.31 , Issue.3 , pp. 187-202
    • Elbaum, S.1    Rothermel, G.2    Karre, S.3    Fisher II, M.4
  • 11
    • 40449091840 scopus 로고    scopus 로고
    • WASP: Protecting web applications using positive tainting and syntax-aware evaluation
    • DOI 10.1109/TSE.2007.70748
    • W. Halfond, A. Orso, and P. Manolios. WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation. IEEE Transactions on Software Engineering, 34(1):65-81, 2008. (Pubitemid 351343903)
    • (2008) IEEE Transactions on Software Engineering , vol.34 , Issue.1 , pp. 65-81
    • Halfond, W.G.J.1    Orso, A.2    Manolios, P.3
  • 16
    • 0035505613 scopus 로고    scopus 로고
    • Measuring and modeling usage and reliability for statistical web testing
    • DOI 10.1109/32.965342
    • C. Kallepalli and J. Tian. Measuring and Modeling Usage and Reliability for Statistical Web Testing. IEEE Transactions on Software Engineering, 27(11):1023-1036, 2001. (Pubitemid 33106030)
    • (2001) IEEE Transactions on Software Engineering , vol.27 , Issue.11 , pp. 1023-1036
    • Kallepalli, C.1    Tian, J.2
  • 17
    • 0025557712 scopus 로고
    • An empirical study of the reliability of unix utilities
    • B. P. Miller, L. Fredriksen, and B. So. An empirical study of the reliability of UNIX utilities. Communications of the ACM, 33(12), 1990.
    • (1990) Communications of the ACM , vol.33 , Issue.12
    • Miller, B.P.1    Fredriksen, L.2    So, B.3
  • 21
    • 14744271048 scopus 로고    scopus 로고
    • Application penetration testing
    • DOI 10.1109/MSP.2005.3
    • H. H. Thompson. Application penetration testing. IEEE Security & Privacy, 3(1):66 - 69, 2005. (Pubitemid 40325585)
    • (2005) IEEE Security and Privacy , vol.3 , Issue.1 , pp. 66-69
    • Thompson, H.H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.