-
1
-
-
0036086884
-
Using programmer-written compiler extensions to catch security holes
-
Washington, DC, USA, IEEE Computer Society
-
K. Ashcraft and D. Engler. Using programmer-written compiler extensions to catch security holes. In IEEE Symposium on Security and Privacy (S&P), pages 143-159, Washington, DC, USA, 2002. IEEE Computer Society.
-
(2002)
IEEE Symposium on Security and Privacy (S&P)
, pp. 143-159
-
-
Ashcraft, K.1
Engler, D.2
-
2
-
-
84964901644
-
Interprocedural exception analysis for Java
-
New York, NY, USA, ACM
-
B.-M. Chang, J.-W. Jo, K. Yi, and K.-M. Choe. Interprocedural exception analysis for Java. In SAC '01: Proceedings of the 2001 ACM symposium on Applied computing, pages 620-625, New York, NY, USA, 2001. ACM.
-
(2001)
SAC '01: Proceedings of the 2001 ACM symposium on Applied computing
, pp. 620-625
-
-
Chang, B.-M.1
Jo, J.-W.2
Yi, K.3
Choe, K.-M.4
-
7
-
-
74049134182
-
-
S. D. Gathman. java-posix. http://www.bmsi.com/java/posix/package.html. Fetched on August 7, 2009.
-
S. D. Gathman. java-posix. http://www.bmsi.com/java/posix/package.html. Fetched on August 7, 2009.
-
-
-
-
8
-
-
74049136698
-
-
The java-gnome user interface library. http://java-gnome.sourceforge.net/ . Fetched on August 7, 2009.
-
The java-gnome user interface library. http://java-gnome.sourceforge.net/ . Fetched on August 7, 2009.
-
-
-
-
9
-
-
74049106419
-
Fetched on
-
JOGL API project, August 7
-
JOGL API project. https://jogl.dev.java.net/. Fetched on August 7, 2009.
-
(2009)
-
-
-
10
-
-
33751027156
-
Pixy: A static analysis tool for detecting web application vulnerabilities (short paper)
-
N. Jovanovic, C. Kruegel, and E. Kirda. Pixy: A static analysis tool for detecting web application vulnerabilities (short paper). In IEEE Symposium on Security and Privacy (S&P), pages 258-263, 2006.
-
(2006)
IEEE Symposium on Security and Privacy (S&P)
, pp. 258-263
-
-
Jovanovic, N.1
Kruegel, C.2
Kirda, E.3
-
11
-
-
57449096730
-
Finding bugs in Java Native Interface programs
-
New York, NY, USA, ACM
-
G. Kondoh and T. Onodera. Finding bugs in Java Native Interface programs. In International Symposium on Software Testing and Analysis (ISSTA), pages 109-118, New York, NY, USA, 2008. ACM.
-
(2008)
International Symposium on Software Testing and Analysis (ISSTA)
, pp. 109-118
-
-
Kondoh, G.1
Onodera, T.2
-
14
-
-
84923564816
-
Finding security vulnerabilities in Java applications with static analysis
-
B. Livshits and M. Lam. Finding security vulnerabilities in Java applications with static analysis. In 14th Usenix Security Symposium, pages 271-286, 2005.
-
(2005)
14th Usenix Security Symposium
, pp. 271-286
-
-
Livshits, B.1
Lam, M.2
-
16
-
-
33646032658
-
Ccured: Type-safe retrofitting of legacy software
-
G. C. Necula, J. Condit, M. Harren, S. McPeak, and W. Weimer. Ccured: type-safe retrofitting of legacy software. ACM Transactions on Programming Languages and Systems, 27(3):477-526, 2005.
-
(2005)
ACM Transactions on Programming Languages and Systems
, vol.27
, Issue.3
, pp. 477-526
-
-
Necula, G.C.1
Condit, J.2
Harren, M.3
McPeak, S.4
Weimer, W.5
-
17
-
-
84959039613
-
CIL: Intermediate language and tools for analysis and transformation of C programs
-
G. C. Necula, S. McPeak, S. P. Rahul, and W. Weimer. CIL: Intermediate language and tools for analysis and transformation of C programs. In International Conference on Compiler Construction (CC), pages 213-228, 2002.
-
(2002)
International Conference on Compiler Construction (CC)
, pp. 213-228
-
-
Necula, G.C.1
McPeak, S.2
Rahul, S.P.3
Weimer, W.4
-
18
-
-
79953672829
-
Dynamic taint analysis for automatic dedection, analysis, and signature generation of exploits on commodity software
-
J. Newsome and D. Song. Dynamic taint analysis for automatic dedection, analysis, and signature generation of exploits on commodity software. In Network and Distributed System Security Symposium(NDSS), 2005.
-
(2005)
Network and Distributed System Security Symposium(NDSS)
-
-
Newsome, J.1
Song, D.2
-
19
-
-
84871349041
-
-
A. Nguyen-tuong, S. Guarnieri, D. Greene, and D. Evans. Automatically hardening web applications using precise tainting. In In 20th IFIP International Information Security Conference, pages 372-382, 2005.
-
A. Nguyen-tuong, S. Guarnieri, D. Greene, and D. Evans. Automatically hardening web applications using precise tainting. In In 20th IFIP International Information Security Conference, pages 372-382, 2005.
-
-
-
-
21
-
-
74049158811
-
-
Python/C API reference manual. http://docs.python.org/c-api/index.html, Apr. 2009.
-
Python/C API reference manual. http://docs.python.org/c-api/index.html, Apr. 2009.
-
-
-
-
23
-
-
22944452575
-
Static analysis to support the evolution of exception structure in object-oriented systems
-
M. P. Robillard and G. C. Murphy. Static analysis to support the evolution of exception structure in object-oriented systems. ACM Transactions on Programming Languages and Systems, 12(2):191-221, 2003.
-
(2003)
ACM Transactions on Programming Languages and Systems
, vol.12
, Issue.2
, pp. 191-221
-
-
Robillard, M.P.1
Murphy, G.C.2
-
24
-
-
74049157231
-
-
M. Schoenefeld. Denial-of-service holes in JDK 1.3.1 and 1.4.1 01. Retrieved Apr 26th, 2008, from http://www.illegalaccess.org/java/ZipBugs.php, 2003.
-
M. Schoenefeld. Denial-of-service holes in JDK 1.3.1 and 1.4.1 01. Retrieved Apr 26th, 2008, from http://www.illegalaccess.org/java/ZipBugs.php, 2003.
-
-
-
-
25
-
-
85084164620
-
-
U. Shankar, K. Talwar, J. S. Foster, and D. Wagner. Detecting format string vulnerabilities with type quali.ers. In In Proceedings of the 10th USENIX Security Symposium, pages 201-220, 2001.
-
U. Shankar, K. Talwar, J. S. Foster, and D. Wagner. Detecting format string vulnerabilities with type quali.ers. In In Proceedings of the 10th USENIX Security Symposium, pages 201-220, 2001.
-
-
-
-
26
-
-
0022605097
-
Typestate: A programming language concept for enhancing software reliability
-
R. E. Strom and S. Yemini. Typestate: A programming language concept for enhancing software reliability. IEEE Transactions on Software Engineering, 12(1):157-171, 1986.
-
(1986)
IEEE Transactions on Software Engineering
, vol.12
, Issue.1
, pp. 157-171
-
-
Strom, R.E.1
Yemini, S.2
-
27
-
-
42149145087
-
Safe Java Native Interface
-
G. Tan, A. W. Appel, S. Chakradhar, A. Raghunathan, S. Ravi, and D. Wang. Safe Java Native Interface. In Proceedings of IEEE International Symposium on Secure Software Engineering, pages 97-106, 2006.
-
(2006)
Proceedings of IEEE International Symposium on Secure Software Engineering
, pp. 97-106
-
-
Tan, G.1
Appel, A.W.2
Chakradhar, S.3
Raghunathan, A.4
Ravi, S.5
Wang, D.6
-
28
-
-
70350696147
-
An empirical security study of the native code in the JDK
-
G. Tan and J. Croft. An empirical security study of the native code in the JDK. In 17th Usenix Security Symposium, pages 365-377, 2008.
-
(2008)
17th Usenix Security Symposium
, pp. 365-377
-
-
Tan, G.1
Croft, J.2
-
29
-
-
74049138510
-
-
US-CERT. Vulnerability note VU#138545: Java Runtime Environment image parsing code buffer overflow vulnerability, June 2007. Credit goes to Chris Evans.
-
US-CERT. Vulnerability note VU#138545: Java Runtime Environment image parsing code buffer overflow vulnerability, June 2007. Credit goes to Chris Evans.
-
-
-
-
30
-
-
74049088846
-
-
US-CERT. Vulnerability note VU#939609: Sun Java JRE vulnerable to arbitrary code execution via an unspecified error, Jan. 2007. Credit goes to Chris Evans.
-
US-CERT. Vulnerability note VU#939609: Sun Java JRE vulnerable to arbitrary code execution via an unspecified error, Jan. 2007. Credit goes to Chris Evans.
-
-
-
-
32
-
-
84910681237
-
Static detection of security vulnerabilities in scripting languages
-
Berkeley, CA, USA, USENIX Association
-
Y. Xie and A. Aiken. Static detection of security vulnerabilities in scripting languages. In 15th Usenix Security Symposium, pages 179-192, Berkeley, CA, USA, 2006. USENIX Association.
-
(2006)
15th Usenix Security Symposium
, pp. 179-192
-
-
Xie, Y.1
Aiken, A.2
-
33
-
-
60649104827
-
Still: Exploit code detection via static taint and initialization analyses
-
Washington, DC, USA, IEEE Computer Society
-
W. Xinran, J. Yoon-Chan, Z. Sencun, and L. Peng. Still: Exploit code detection via static taint and initialization analyses. In ACSAC '08: Proceedings of the 2008 Annual Computer Security Applications Conference, pages 289-298, Washington, DC, USA, 2008. IEEE Computer Society.
-
(2008)
ACSAC '08: Proceedings of the 2008 Annual Computer Security Applications Conference
, pp. 289-298
-
-
Xinran, W.1
Yoon-Chan, J.2
Sencun, Z.3
Peng, L.4
-
34
-
-
85038810709
-
Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
-
Berkeley, CA, USA, USENIX Association
-
W. Xu, S. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: a practical approach to defeat a wide range of attacks. In 15th Usenix Security Symposium, Berkeley, CA, USA, 2006. USENIX Association.
-
(2006)
15th Usenix Security Symposium
-
-
Xu, W.1
Bhatkar, S.2
Sekar, R.3
|