메뉴 건너뛰기




Volumn , Issue , 2009, Pages 173-186

Ripley: Automatically securing web 2.0 applications through replicated execution

Author keywords

Replication; Tier splitting; Web applications

Indexed keywords

APPLICATION DEVELOPERS; ASP.NET; DISTRIBUTED COMPUTATIONS; DISTRIBUTED WEB APPLICATION; FACEBOOK; GOOGLE MAPS; HOTMAIL; JAVASCRIPT; MULTI-TIER; RICH INTERNET APPLICATIONS; ROUND TRIP; USER ACTION; WEB 2.0 APPLICATIONS; WEB APPLICATION;

EID: 74049104017     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1653662.1653685     Document Type: Conference Paper
Times cited : (71)

References (59)
  • 4
    • 0345757358 scopus 로고    scopus 로고
    • Practical byzantine fault tolerance and proactive recovery
    • Nov
    • M. Castro and B. Liskov. Practical byzantine fault tolerance and proactive recovery. ACM Transactions on Computer Systems, 20(4):398-461, Nov. 2002.
    • (2002) ACM Transactions on Computer Systems , vol.20 , Issue.4 , pp. 398-461
    • Castro, M.1    Liskov, B.2
  • 5
    • 84872154806 scopus 로고    scopus 로고
    • CGI Security
    • CGI Security. The cross-site scripting FAQ. http://www.cgisecurity.net/ articles/xss-faq.shtml.
    • The cross-site scripting FAQ
  • 9
    • 84978401615 scopus 로고    scopus 로고
    • G. W. Dunlap, S. T. King, S. Cinar, M. A. Basrai, and P. M. Chen. Revirt: Enabling intrusion analysis through virtual-machine logging and replay. In In Proceedings of the Symposium on Operating Systems Design and Implementation, pages 211-224, Dec. 2002.
    • G. W. Dunlap, S. T. King, S. Cinar, M. A. Basrai, and P. M. Chen. Revirt: Enabling intrusion analysis through virtual-machine logging and replay. In In Proceedings of the Symposium on Operating Systems Design and Implementation, pages 211-224, Dec. 2002.
  • 13
    • 85013748296 scopus 로고    scopus 로고
    • S. Fogie, J. Grossman, R. Hansen, A. Rager, and P. D. Petkov. XSS Attacks: Cross Site Scripting Exploits and Defense. Syngress, 2007.
    • S. Fogie, J. Grossman, R. Hansen, A. Rager, and P. D. Petkov. XSS Attacks: Cross Site Scripting Exploits and Defense. Syngress, 2007.
  • 14
    • 58049135849 scopus 로고    scopus 로고
    • Google Gears. http://gears.google.com.
    • Google Gears
  • 29
    • 74049095792 scopus 로고    scopus 로고
    • At the forge: Firebug
    • R. Lerner. At the forge: Firebug. Linux J., 2007(157):8, 2007.
    • (2007) Linux J , vol.2007 , Issue.157 , pp. 8
    • Lerner, R.1
  • 31
  • 33
    • 50549102800 scopus 로고    scopus 로고
    • Volta: Developing distributed applications by recompiling
    • Oct
    • D. Manolescu, B. Beckman, and B. Livshits. Volta: Developing distributed applications by recompiling. IEEE Software, 25(5):53-59, Oct. 2008.
    • (2008) IEEE Software , vol.25 , Issue.5 , pp. 53-59
    • Manolescu, D.1    Beckman, B.2    Livshits, B.3
  • 34
    • 36448963891 scopus 로고    scopus 로고
    • SecuriFly: Runtime vulnerability protection for Web applications
    • Technical report, Stanford University
    • M. Martin, B. Livshits, and M. S. Lam. SecuriFly: Runtime vulnerability protection for Web applications. Technical report, Stanford University, 2006.
    • (2006)
    • Martin, M.1    Livshits, B.2    Lam, M.S.3
  • 35
  • 36
    • 74049117326 scopus 로고    scopus 로고
    • Microsoft Corporation. Microsoft Live Labs Volta. http: //research.microsoft.com/~emeijer/CloudProgrammability.html, 2007.
    • (2007)
  • 37
    • 74049133751 scopus 로고    scopus 로고
    • Microsoft Corporation. Silverlight. http://silverlight.net, 2007.
    • (2007) Silverlight
  • 39
    • 27544515395 scopus 로고    scopus 로고
    • Bugnet: Continuously recording program execution for deterministic replay debugging
    • May
    • S. Narayanasamy, G. Pokam, and B. Calder. Bugnet: Continuously recording program execution for deterministic replay debugging. SIGARCH Computer Architecture News, 33(2):284-295, May 2005.
    • (2005) SIGARCH Computer Architecture News , vol.33 , Issue.2 , pp. 284-295
    • Narayanasamy, S.1    Pokam, G.2    Calder, B.3
  • 42
  • 44
    • 0025564050 scopus 로고
    • Implementing fault-tolerant services using the state machine approach: A tutorial
    • Dec
    • F. B. Schneider. Implementing fault-tolerant services using the state machine approach: a tutorial. ACM Compututing Surveys, 22(4):299-319, Dec. 1990.
    • (1990) ACM Compututing Surveys , vol.22 , Issue.4 , pp. 299-319
    • Schneider, F.B.1
  • 45
    • 74049114374 scopus 로고    scopus 로고
    • S. Segan. For Skyfire's mobile Web, the secret's in the server. http: //www.pcmag.com/print-article2/0,1217,a%253D223932,00.asp, Jan. 2008.
    • S. Segan. For Skyfire's mobile Web, the secret's in the server. http: //www.pcmag.com/print-article2/0,1217,a%253D223932,00.asp, Jan. 2008.
  • 48
    • 74049132559 scopus 로고    scopus 로고
    • C. Stockwell. What's Coming in IE8. http: //blogs.msdn.com/ie/archive/ 2008/08/26/ie8-performance.aspx, 2008.
    • C. Stockwell. What's Coming in IE8. http: //blogs.msdn.com/ie/archive/ 2008/08/26/ie8-performance.aspx, 2008.
  • 50
  • 51
    • 0000990322 scopus 로고
    • A survey of program slicing techniques
    • F. Tip. A survey of program slicing techniques. Journal of programming languages, 3:121-189, 1995.
    • (1995) Journal of programming languages , vol.3 , pp. 121-189
    • Tip, F.1
  • 52


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.