-
2
-
-
67649859970
-
Efficient and extensible security enforcement using dynamic data flow analysis
-
New York, NY, USA, ACM
-
W. Chang, B. Streiff, and C. Lin. Efficient and extensible security enforcement using dynamic data flow analysis. In CCS '08: Proceedings of the 15th ACM conference on Computer and communications security, pages 39-50, New York, NY, USA, 2008. ACM.
-
(2008)
CCS '08: Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 39-50
-
-
Chang, W.1
Streiff, B.2
Lin, C.3
-
5
-
-
77954598664
-
Masibty: An anomaly based intrusion prevention system for web applications
-
C. Criscione and S. Zanero. Masibty: an anomaly based intrusion prevention system for web applications. In Black Hat Europe 2009, 2009.
-
(2009)
Black Hat Europe 2009
-
-
Criscione, C.1
Zanero, S.2
-
6
-
-
85076893888
-
Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs
-
USENIX Association
-
D. E. Cristian Cadar, Daniel Dunbar. Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs. In USENIX Symposium on Operating Systems Design and Implementation, pages 209-224. USENIX Association, 2008.
-
(2008)
USENIX Symposium on Operating Systems Design and Implementation
, pp. 209-224
-
-
Cristian Cadar, D.E.1
Dunbar, D.2
-
7
-
-
33646851992
-
A software implementation of a genetic algorithm based approach to network intrusion detection
-
May
-
R. H. Gong, M. Zulkernine, and P. Abolmaesumi. A software implementation of a genetic algorithm based approach to network intrusion detection. In Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, 2005 and First ACIS International Workshop on Self-Assembling Wireless Networks. SNPD/SAWN 2005. Sixth International Conference on, pages 246-253, May 2005.
-
(2005)
Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, 2005 and First ACIS International Workshop on Self-Assembling Wireless Networks. SNPD/SAWN 2005. Sixth International Conference on
, pp. 246-253
-
-
Gong, R.H.1
Zulkernine, M.2
Abolmaesumi, P.3
-
8
-
-
40449126880
-
Detecting buffer overflow via automatic test input data generation
-
Special Issue: Search-based Software Engineering
-
C. D. Grosso, G. Antoniol, E. Merlo, and P. Galinier. Detecting buffer overflow via automatic test input data generation. Computers and Operations Research, 35(10):3125-3143, 2008. Special Issue: Search-based Software Engineering.
-
(2008)
Computers and Operations Research
, vol.35
, Issue.10
, pp. 3125-3143
-
-
Grosso, C.D.1
Antoniol, G.2
Merlo, E.3
Galinier, P.4
-
9
-
-
19944365247
-
Securing web application code by static analysis and runtime protection
-
New York, NY, USA, ACM
-
Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D.-T. Lee, and S.-Y. Kuo. Securing web application code by static analysis and runtime protection. In WWW '04: Proceedings of the 13th international conference on World Wide Web, pages 40-52, New York, NY, USA, 2004. ACM.
-
(2004)
WWW '04: Proceedings of the 13th International Conference on World Wide Web
, pp. 40-52
-
-
Huang, Y.-W.1
Yu, F.2
Hang, C.3
Tsai, C.-H.4
Lee, D.-T.5
Kuo, S.-Y.6
-
10
-
-
33751027156
-
Pixy: A static analysis tool for detecting web application vulnerabilities (short paper)
-
Washington, DC, USA, IEEE Computer Society
-
N. Jovanovic, C. Kruegel, and E. Kirda. Pixy: A static analysis tool for detecting web application vulnerabilities (short paper). In SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy, pages 258-263, Washington, DC, USA, 2006. IEEE Computer Society.
-
(2006)
SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy
, pp. 258-263
-
-
Jovanovic, N.1
Kruegel, C.2
Kirda, E.3
-
12
-
-
84923564816
-
Finding security vulnerabilities in java applications with static analysis
-
Berkeley, CA, USA, USENIX Association
-
V. B. Livshits and M. S. Lam. Finding security vulnerabilities in java applications with static analysis. In SSYM'05: Proceedings of the 14th conference on USENIX Security Symposium, pages 271-286, Berkeley, CA, USA, 2005. USENIX Association.
-
(2005)
SSYM'05: Proceedings of the 14th Conference on USENIX Security Symposium
, pp. 271-286
-
-
Livshits, V.B.1
Lam, M.S.2
-
13
-
-
34548738230
-
Hybrid concolic testing
-
Washington, DC, USA, IEEE Computer Society
-
R. Majumdar and K. Sen. Hybrid concolic testing. In ICSE '07: Proceedings of the 29th international conference on Software Engineering, pages 416-426, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
ICSE '07: Proceedings of the 29th International Conference on Software Engineering
, pp. 416-426
-
-
Majumdar, R.1
Sen, K.2
-
14
-
-
0033343346
-
Test-data generation using genetic algorithms
-
September
-
R. Pargas, M. J. Harrold, and R. Peck. Test-data generation using genetic algorithms. Journal of Software Testing, Verifications, and Reliability, 9:263-282, September 1999.
-
(1999)
Journal of Software Testing, Verifications, and Reliability
, vol.9
, pp. 263-282
-
-
Pargas, R.1
Harrold, M.J.2
Peck, R.3
-
15
-
-
32344447459
-
Cute: A concolic unit testing engine for c
-
New York, NY, USA, ACM
-
K. Sen, D. Marinov, and G. Agha. Cute: a concolic unit testing engine for c. In Proceedings of the 10th European software engineering conference, pages 263-272, New York, NY, USA, 2005. ACM.
-
(2005)
Proceedings of the 10th European Software Engineering Conference
, pp. 263-272
-
-
Sen, K.1
Marinov, D.2
Agha, G.3
-
16
-
-
85084164620
-
Detecting format string vulnerabilities with type qualifiers
-
Berkeley, CA, USA, USENIX Association
-
U. Shankar, K. Talwar, J. S. Foster, and D. Wagner. Detecting format string vulnerabilities with type qualifiers. In SSYM'01: Proceedings of the 10th conference on USENIX Security Symposium, pages 16-16, Berkeley, CA, USA, 2001. USENIX Association.
-
(2001)
SSYM'01: Proceedings of the 10th Conference on USENIX Security Symposium
, pp. 16-16
-
-
Shankar, U.1
Talwar, K.2
Foster, J.S.3
Wagner, D.4
-
17
-
-
0004019724
-
-
chapter Two approaches to interprocedural data flow analysis, Prentice Hall
-
M. Sharir and A. Pnueli. Program Flow Analysis: Theory and Applications, chapter Two approaches to interprocedural data flow analysis, pages 189-233. Prentice Hall, 1981.
-
(1981)
Program Flow Analysis: Theory and Applications
, pp. 189-233
-
-
Sharir, M.1
Pnueli, A.2
-
18
-
-
0027592833
-
Extending typestate checking using conditional liveness analysis
-
May
-
R. Strom and D. Yellin. Extending typestate checking using conditional liveness analysis. Software Engineering, IEEE Transactions on, 19(5):478-485, May 1993.
-
(1993)
Software Engineering, IEEE Transactions on
, vol.19
, Issue.5
, pp. 478-485
-
-
Strom, R.1
Yellin, D.2
-
19
-
-
23744485743
-
Evolutionary testing of classes
-
New York, NY, USA, ACM
-
P. Tonella. Evolutionary testing of classes. In ISSTA '04: Proceedings of the 2004 ACM SIGSOFT international symposium on Software testing and analysis, pages 119-128, New York, NY, USA, 2004. ACM.
-
(2004)
ISSTA '04: Proceedings of the 2004 ACM SIGSOFT International Symposium on Software Testing and Analysis
, pp. 119-128
-
-
Tonella, P.1
-
20
-
-
56349123085
-
Automated detection of code vulnerabilities based on program analysis and model checking
-
Sept.
-
L. Wang, Q. Zhang, and P. Zhao. Automated detection of code vulnerabilities based on program analysis and model checking. In Source Code Analysis and Manipulation, 2008 Eighth IEEE International Working Conference on, pages 165-173, Sept. 2008.
-
(2008)
Source Code Analysis and Manipulation, 2008 Eighth IEEE International Working Conference on
, pp. 165-173
-
-
Wang, L.1
Zhang, Q.2
Zhao, P.3
-
21
-
-
57349153984
-
Static detection of cross-site scripting vulnerabilities
-
New York, NY, USA, ACM
-
G. Wassermann and Z. Su. Static detection of cross-site scripting vulnerabilities. In ICSE '08: Proceedings of the 30th international conference on Software engineering, pages 171-180, New York, NY, USA, 2008. ACM.
-
(2008)
ICSE '08: Proceedings of the 30th International Conference on Software Engineering
, pp. 171-180
-
-
Wassermann, G.1
Su, Z.2
-
23
-
-
57449103850
-
Dynamic test input generation for web applications
-
New York, NY, USA, ACM
-
G. Wassermann, D. Yu, A. Chander, D. Dhurjati, H. Inamura, and Z. Su. Dynamic test input generation for web applications. In ISSTA '08: Proceedings of the 2008 international symposium on Software testing and analysis, pages 249-260, New York, NY, USA, 2008. ACM.
-
(2008)
In ISSTA '08: Proceedings of the 2008 International Symposium on Software Testing and Analysis
, pp. 249-260
-
-
Wassermann, G.1
Yu, D.2
Chander, A.3
Dhurjati, D.4
Inamura, H.5
Su, Z.6
|