메뉴 건너뛰기




Volumn 44, Issue 6, 2009, Pages 75-86

Merlin: Specification inference for explicit information flow problems

Author keywords

Security analysis tools; Specification inferences

Indexed keywords

BUFFER OVERRUN; CROSS SITE SCRIPTING; DATA PROPAGATION; EXPLICIT INFORMATION; EXPONENTIAL NUMBERS; FACTOR GRAPHS; FALSE POSITIVE; FALSE POSITIVE RATES; INFORMATION FLOWS; INTER-PROCEDURAL; LARGE BUSINESS; MANUAL LABORS; NEW APPROACHES; PATH CONSTRAINT; PROBABILISTIC ABSTRACTION; PROBABILISTIC CONSTRAINTS; PROBABILISTIC INFERENCE; PROGRAM CODE; PROPAGATION GRAPH; QUALITY OF RESULTS; RUN-TIME ANALYSIS; SECURITY ANALYSIS TOOLS; SECURITY VIOLATIONS; SQL INJECTION; WEB APPLICATION;

EID: 67650837962     PISSN: 15232867     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Conference Paper
Times cited : (47)

References (36)
  • 1
    • 48649085342 scopus 로고    scopus 로고
    • Fine-grained information flow analysis and enforcement in a java virtual machine
    • D. Chandra and M. Franz. Fine-grained information flow analysis and enforcement in a java virtual machine. In Annual Computer Security Applications Conference, pages 463-475, 2007.
    • (2007) Annual Computer Security Applications Conference , pp. 463-475
    • Chandra, D.1    Franz, M.2
  • 5
    • 67650851424 scopus 로고    scopus 로고
    • C. L. Goues and W. Weimer. Specification mining with few false positives. In Tools and Algorithms for the Construction and Analysis of Systems, 2009.
    • C. L. Goues and W. Weimer. Specification mining with few false positives. In Tools and Algorithms for the Construction and Analysis of Systems, 2009.
  • 7
    • 84945708698 scopus 로고
    • An axiomatic basis for computer programming
    • October
    • C. A. R. Hoare. An axiomatic basis for computer programming. Communications of the ACM, 12:576-583, October 1969.
    • (1969) Communications of the ACM , vol.12 , pp. 576-583
    • Hoare, C.A.R.1
  • 13
    • 32344452883 scopus 로고    scopus 로고
    • Pr-miner: Automatically extracting implicit programming rules and detecting violations in large software code
    • Z. Li and Y. Zhou. Pr-miner: Automatically extracting implicit programming rules and detecting violations in large software code. In Proceedings of the European Software Engineering Conference, 2005.
    • (2005) Proceedings of the European Software Engineering Conference
    • Li, Z.1    Zhou, Y.2
  • 15
    • 33745184790 scopus 로고    scopus 로고
    • Finding security errors in Java programs with static analysis
    • Aug
    • B. Livshits and M. S. Lam. Finding security errors in Java programs with static analysis. In Proceedings of the Usenix Security Symposium, pages 271-286, Aug. 2005.
    • (2005) Proceedings of the Usenix Security Symposium , pp. 271-286
    • Livshits, B.1    Lam, M.S.2
  • 18
    • 36448963891 scopus 로고    scopus 로고
    • SecuriFly: Runtime vulnerability protection for Web applications
    • Technical report, Stanford University, Oct
    • M. Martin, B. Livshits, and M. S. Lam. SecuriFly: Runtime vulnerability protection for Web applications. Technical report, Stanford University, Oct. 2006.
    • (2006)
    • Martin, M.1    Livshits, B.2    Lam, M.S.3
  • 20
  • 21
    • 67650797177 scopus 로고    scopus 로고
    • Microsoft Corporation. Microsoft Code Analysis Tool .NET (CAT.NET). http://www.microsoft. com/downloads/details.aspx?FamilyId= 0178e2ef-9da8-445e- 9348-c93f24cc9f9d&displaylang=en, 3 2009.
    • Microsoft Corporation. Microsoft Code Analysis Tool .NET (CAT.NET). http://www.microsoft. com/downloads/details.aspx?FamilyId= 0178e2ef-9da8-445e- 9348-c93f24cc9f9d&displaylang=en, 3 2009.
  • 22
    • 67650787293 scopus 로고    scopus 로고
    • T. Minka, J. Winn, J. Guiver, and A. Kannan. Infer.NET 2.2, 2009. Microsoft Research Cambridge. http://research.microsoft.com/infernet.
    • T. Minka, J. Winn, J. Guiver, and A. Kannan. Infer.NET 2.2, 2009. Microsoft Research Cambridge. http://research.microsoft.com/infernet.
  • 24
    • 67650845233 scopus 로고    scopus 로고
    • OunceLabs, Inc
    • OunceLabs, Inc. Ounce. http://www.ouncelabs.com/, 2008.
    • (2008) Ounce
  • 26
    • 35448936014 scopus 로고    scopus 로고
    • Static specification inference using predicate mining
    • M. K. Ramanathan, A. Grama, and S. Jagannathan. Static specification inference using predicate mining. In PLDI, 2007.
    • (2007) PLDI
    • Ramanathan, M.K.1    Grama, A.2    Jagannathan, S.3
  • 28
    • 38849110791 scopus 로고    scopus 로고
    • The essence of command injection attacks in web applications
    • Z. Su and G. Wassermann. The essence of command injection attacks in web applications. In Proceedings of POPL, 2006.
    • (2006) Proceedings of POPL
    • Su, Z.1    Wassermann, G.2
  • 30
  • 33
    • 33846480503 scopus 로고    scopus 로고
    • Static detection of security vulnerabilities in scripting languages
    • Aug
    • Y. Xie and A. Aiken. Static detection of security vulnerabilities in scripting languages. In Proceedings of the Usenix Security Symposium, pages 271-286, Aug. 2006.
    • (2006) Proceedings of the Usenix Security Symposium , pp. 271-286
    • Xie, Y.1    Aiken, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.