메뉴 건너뛰기




Volumn 44, Issue 6, 2009, Pages 87-97

TAJ: Effective taint analysis of web applications

Author keywords

Information flow; Integrity; Security; Static analysis; Taint analysis; Web applications

Indexed keywords

INFORMATION FLOW; INTEGRITY; SECURITY; TAINT ANALYSIS; WEB APPLICATIONS;

EID: 67650821903     PISSN: 15232867     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Conference Paper
Times cited : (163)

References (40)
  • 1
    • 33845946966 scopus 로고
    • Analysis and Specialization for the C Programming Language. PhD thesis, University of Copenhagen, Denmark
    • L. O. Andersen. Program Analysis and Specialization for the C Programming Language. PhD thesis, University of Copenhagen, Denmark, 1994.
    • (1994) Program
    • Andersen, L.O.1
  • 2
    • 0036086884 scopus 로고    scopus 로고
    • Using Programmer-Written Compiler Extensions to Catch Security Holes
    • K. Ashcraft and D. Engler. Using Programmer-Written Compiler Extensions to Catch Security Holes. In S&P 2002.
    • S&P 2002
    • Ashcraft, K.1    Engler, D.2
  • 3
    • 0034448902 scopus 로고    scopus 로고
    • ABCD: Eliminating Array Bounds Checks on Demand
    • R. Bodík, R. Gupta, and V. Sarkar. ABCD: Eliminating Array Bounds Checks on Demand. In PLDI 2000.
    • (2000) PLDI
    • Bodík, R.1    Gupta, R.2    Sarkar, V.3
  • 4
    • 67649859970 scopus 로고    scopus 로고
    • Efficient and Extensible Security Enforcement Using Dynamic Data Flow Analysis
    • W. Chang, B. Streiff, and C. Lin. Efficient and Extensible Security Enforcement Using Dynamic Data Flow Analysis. In CCS 2008.
    • CCS 2008
    • Chang, W.1    Streiff, B.2    Lin, C.3
  • 5
    • 4544357182 scopus 로고    scopus 로고
    • Modular Static Program Analysis
    • P. Cousot and R. Cousot. Modular Static Program Analysis. In CC 2002.
    • CC 2002
    • Cousot, P.1    Cousot, R.2
  • 6
    • 0026243790 scopus 로고
    • Efficiently Computing Static Single Assignment Form and the Control Dependence Graph
    • R. Cytron, J. Ferrante, B. K. Rosen, M. N. Wegman, and F. K. Zadeck. Efficiently Computing Static Single Assignment Form and the Control Dependence Graph. TOPLAS, 13(4), 1991.
    • (1991) TOPLAS , vol.13 , Issue.4
    • Cytron, R.1    Ferrante, J.2    Rosen, B.K.3    Wegman, M.N.4    Zadeck, F.K.5
  • 7
    • 0016949746 scopus 로고
    • A Lattice Model of Secure Information Flow
    • D. E. Denning. A Lattice Model of Secure Information Flow. CACM, 19(5), 1976.
    • (1976) CACM , vol.19 , Issue.5
    • Denning, D.E.1
  • 8
    • 0017517624 scopus 로고
    • Certification of Programs for Secure Information Flow
    • D. E. Denning and P. J. Denning. Certification of Programs for Secure Information Flow. CACM, 20(7), 1977.
    • (1977) CACM , vol.20 , Issue.7
    • Denning, D.E.1    Denning, P.J.2
  • 9
    • 67650793474 scopus 로고    scopus 로고
    • S. Fink, J. Dolby, and L. Colby. Semi-Automatic J2EE Transaction Configuration. IBM Research Report RC23326, 2004.
    • S. Fink, J. Dolby, and L. Colby. Semi-Automatic J2EE Transaction Configuration. IBM Research Report RC23326, 2004.
  • 12
    • 0020299523 scopus 로고    scopus 로고
    • Security Policies and Security Models
    • J. A. Goguen and J. Meseguer. Security Policies and Security Models. In S&P 1982.
    • S&P 1982
    • Goguen, J.A.1    Meseguer, J.2
  • 13
    • 34250357872 scopus 로고    scopus 로고
    • Information Flow Control for Java Based on Path Conditions in Dependence Graphs
    • C. Hammer, J. Krinke, and G. Snelting. Information Flow Control for Java Based on Path Conditions in Dependence Graphs. In ISSSE 2006.
    • ISSSE 2006
    • Hammer, C.1    Krinke, J.2    Snelting, G.3
  • 14
    • 0031642547 scopus 로고    scopus 로고
    • Using Static Single Assignment Form to Improve Flow-insensitive Pointer Analysis
    • R. Hasti and S. Horwitz. Using Static Single Assignment Form to Improve Flow-insensitive Pointer Analysis. In PLDI 1998.
    • PLDI 1998
    • Hasti, R.1    Horwitz, S.2
  • 16
  • 18
    • 35548979013 scopus 로고    scopus 로고
    • Context-Sensitive Points-to Analysis: Is It Worth It?
    • O. Lhoták and L. J. Hendren. Context-Sensitive Points-to Analysis: Is It Worth It? In CC 2006.
    • CC 2006
    • Lhoták, O.1    Hendren, L.J.2
  • 20
    • 84923564816 scopus 로고    scopus 로고
    • Finding Security Vulnerabilities in Java Applications with Static Analysis
    • V. B. Livshits and M. S. Lam. Finding Security Vulnerabilities in Java Applications with Static Analysis. In USENIX Security 2005.
    • USENIX Security 2005
    • Livshits, V.B.1    Lam, M.S.2
  • 21
    • 57349180506 scopus 로고    scopus 로고
    • Quantitative Information Flow as Network Flow Capacity
    • S. McCamant and M. D. Ernst. Quantitative Information Flow as Network Flow Capacity. In PLDI 2008.
    • PLDI 2008
    • McCamant, S.1    Ernst, M.D.2
  • 22
    • 13844296853 scopus 로고    scopus 로고
    • Parameterized Object Sensitivity for Points-to Analysis for Java
    • A. Milanova, A. Rountev, and B. G. Ryder. Parameterized Object Sensitivity for Points-to Analysis for Java. TOSEM, 14(1), 2005.
    • (2005) TOSEM , vol.14 , Issue.1
    • Milanova, A.1    Rountev, A.2    Ryder, B.G.3
  • 23
    • 33749823368 scopus 로고    scopus 로고
    • Static Approximation of Dynamically Generated Web
    • Y. Minamide. Static Approximation of Dynamically Generated Web Pages. In WWW 2005.
    • WWW 2005
    • Minamide, Y.1
  • 24
    • 0032646625 scopus 로고    scopus 로고
    • JFlow: Practical Mostly-static Information Flow Control
    • A. C. Myers. JFlow: Practical Mostly-static Information Flow Control. In POPL 1999.
    • POPL 1999
    • Myers, A.C.1
  • 25
    • 0002934582 scopus 로고    scopus 로고
    • A Decentralized Model for Information Flow Control
    • A. C. Myers and B. Liskov. A Decentralized Model for Information Flow Control. In SOSP 1997.
    • SOSP 1997
    • Myers, A.C.1    Liskov, B.2
  • 26
    • 84869521110 scopus 로고    scopus 로고
    • OWASP
    • OWASP, http://www.owasp.org.
  • 27
    • 33745965014 scopus 로고    scopus 로고
    • Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection
    • M. Pistoia, R. J. Flynn, L. Koved, and V. C. Sreedhar. Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection. In ECOOP 2005.
    • ECOOP 2005
    • Pistoia, M.1    Flynn, R.J.2    Koved, L.3    Sreedhar, V.C.4
  • 28
    • 0029180939 scopus 로고    scopus 로고
    • Precise Interprocedural Dataflow Analysis via Graph Reachability
    • T. Reps, S. Horwitz, and M. Sagiv. Precise Interprocedural Dataflow Analysis via Graph Reachability. In POPL 1995.
    • POPL 1995
    • Reps, T.1    Horwitz, S.2    Sagiv, M.3
  • 29
    • 80051939591 scopus 로고    scopus 로고
    • Dimensions of Precision in Reference Analysis of Object-Oriented Languages
    • Invited Paper
    • B. G. Ryder. Dimensions of Precision in Reference Analysis of Object-Oriented Languages. In CC 2003. Invited Paper.
    • CC 2003
    • Ryder, B.G.1
  • 31
    • 33750912954 scopus 로고    scopus 로고
    • Efficent Path Conditions in Dependence Graphs for Software Safety Analysis
    • G. Snelting, T. Robschink, and J. Krinke. Efficent Path Conditions in Dependence Graphs for Software Safety Analysis. TOSEM, 15(4), 2006.
    • (2006) TOSEM , vol.15 , Issue.4
    • Snelting, G.1    Robschink, T.2    Krinke, J.3
  • 32
    • 33746049190 scopus 로고    scopus 로고
    • Refinement-based Context-sensitive Points-to Analysis for Java
    • M. Sridharan and R. Bodík. Refinement-based Context-sensitive Points-to Analysis for Java. In PLDI 2006.
    • PLDI 2006
    • Sridharan, M.1    Bodík, R.2
  • 36
    • 0030370740 scopus 로고    scopus 로고
    • A Sound Type System for Secure Flow Analysis
    • D. Volpano, C. Irvine, and G. Smith. A Sound Type System for Secure Flow Analysis. JCS, 4(2-3), 1996.
    • (1996) JCS , vol.4 , Issue.2-3
    • Volpano, D.1    Irvine, C.2    Smith, G.3
  • 38
    • 35449004893 scopus 로고    scopus 로고
    • Sound and Precise Analysis of Web Applications for Injection Vulnerabilities
    • G. Wassermann and Z. Su. Sound and Precise Analysis of Web Applications for Injection Vulnerabilities. In PLDI 2007.
    • PLDI 2007
    • Wassermann, G.1    Su, Z.2
  • 39
    • 57349153984 scopus 로고    scopus 로고
    • G. Wassermann and Z. Su. Static Detection of Cross-site Scripting Vulnerabilities. In ICSE 2008.
    • G. Wassermann and Z. Su. Static Detection of Cross-site Scripting Vulnerabilities. In ICSE 2008.
  • 40
    • 8344251741 scopus 로고    scopus 로고
    • Cloning Based Context-Sensitive Pointer Alias Analysis Using Binary Decision Diagrams
    • J. Whaley and M. S. Lam. Cloning Based Context-Sensitive Pointer Alias Analysis Using Binary Decision Diagrams. In PLDI 2004.
    • PLDI 2004
    • Whaley, J.1    Lam, M.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.