메뉴 건너뛰기




Volumn , Issue , 2009, Pages 25-32

A hybrid analysis framework for detecting web application vulnerabilities

Author keywords

[No Author keywords available]

Indexed keywords

BYTECODES; DYNAMIC MONITORING; HYBRID ANALYSIS; OUTPUT FUNCTIONS; PROGRAM ANALYSIS; RUNTIMES; SENSITIVE DATAS; STATIC AND DYNAMIC APPROACH; WEB APPLICATION; WEB APPLICATION VULNERABILITY;

EID: 70349923612     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IWSESS.2009.5068455     Document Type: Conference Paper
Times cited : (24)

References (20)
  • 1
    • 33846012075 scopus 로고
    • A. V. Aho, R. Sethi, and J. D. Ullman. Compilers, Addison-Wesley
    • A. V. Aho, R. Sethi, and J. D. Ullman. Compilers, Principles, Techniques, and Tools. Addison-Wesley, 1986.
    • (1986) Principles, Techniques, and Tools
  • 2
    • 84976844361 scopus 로고
    • Control Flow Analysis
    • F. E. Allen. Control Flow Analysis. SIGPLAN Notices, 5, 1970.
    • (1970) SIGPLAN Notices , vol.5
    • Allen, F.E.1
  • 5
    • 51849162672 scopus 로고    scopus 로고
    • Vulnerability Analysis of Web Applications
    • L. Baresi and E. Di Nitto, editors, Springer
    • M. Cova, V. Felmetsger, and G. Vigna. Vulnerability Analysis of Web Applications. In L. Baresi and E. Di Nitto, editors, Testing and Analysis of Web Services. Springer, 2007.
    • (2007) Testing and Analysis of Web Services
    • Cova, M.1    Felmetsger, V.2    Vigna, G.3
  • 6
    • 1542595877 scopus 로고    scopus 로고
    • Static and Dynamic Analysis: Synergy and Duality
    • Portland, OR, May 9
    • M. D. Ernst. Static and Dynamic Analysis: Synergy and Duality. In WODA 2003: ICSE Workshop on Dynamic Analysis, Portland, OR, May 9, 2003.
    • (2003) WODA 2003: ICSE Workshop on Dynamic Analysis
    • Ernst, M.D.1
  • 7
    • 57449112285 scopus 로고    scopus 로고
    • A dynamic technique for enhancing the security and privacy of web applications
    • A. Futoransky, E. Gutesman, and A. Waissbein. A dynamic technique for enhancing the security and privacy of web applications. In Black Hat USA, 2007.
    • (2007) Black Hat USA
    • Futoransky, A.1    Gutesman, E.2    Waissbein, A.3
  • 12
    • 33751027156 scopus 로고    scopus 로고
    • Pixy: A static analysis tool for detecting web application vulnerabilities (short paper)
    • IEEE Computer Society
    • N. Jovanovic, C. Krügel, and E. Kirda. Pixy: A static analysis tool for detecting web application vulnerabilities (short paper). In IEEE Symposium on Security and Privacy. IEEE Computer Society, 2006.
    • (2006) IEEE Symposium on Security and Privacy
    • Jovanovic, N.1    Krügel, C.2    Kirda, E.3
  • 13
    • 84871349041 scopus 로고    scopus 로고
    • A. Nguyen-tuong, S. Guarnieri, D. Greene, J. Shirley, and D. Evans. Automatically hardening web applications using precise tainting. In In 20th IFIP International Information Security Conference, 2005.
    • A. Nguyen-tuong, S. Guarnieri, D. Greene, J. Shirley, and D. Evans. Automatically hardening web applications using precise tainting. In In 20th IFIP International Information Security Conference, 2005.
  • 20
    • 84910681237 scopus 로고    scopus 로고
    • Static detection of security vulnerabilities in scripting languages
    • Berkeley, CA, USA, USENIX Association
    • Y. Xie and A. Aiken. Static detection of security vulnerabilities in scripting languages. In Proceedings of the 15th conference on USENIX Security Symposium, Berkeley, CA, USA, 2006. USENIX Association.
    • (2006) Proceedings of the 15th conference on USENIX Security Symposium
    • Xie, Y.1    Aiken, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.