메뉴 건너뛰기




Volumn , Issue , 2010, Pages 65-71

Towards security testing with taint analysis and genetic algorithms

Author keywords

cross site scripting; genetic algorithms; security testing; taint analysis

Indexed keywords

AUTOMATIC ASSISTANCE; CROSS SITE SCRIPTING; FALSE POSITIVE; INPUT VECTOR; POTENTIAL BENEFITS; SECURITY TESTING; TEST CASE; WEB APPLICATION;

EID: 77954612683     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1809100.1809110     Document Type: Conference Paper
Times cited : (38)

References (23)
  • 5
    • 77954598664 scopus 로고    scopus 로고
    • Masibty: An anomaly based intrusion prevention system for web applications
    • C. Criscione and S. Zanero. Masibty: an anomaly based intrusion prevention system for web applications. In Black Hat Europe 2009, 2009.
    • (2009) Black Hat Europe 2009
    • Criscione, C.1    Zanero, S.2
  • 6
    • 85076893888 scopus 로고    scopus 로고
    • Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs
    • USENIX Association
    • D. E. Cristian Cadar, Daniel Dunbar. Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs. In USENIX Symposium on Operating Systems Design and Implementation, pages 209-224. USENIX Association, 2008.
    • (2008) USENIX Symposium on Operating Systems Design and Implementation , pp. 209-224
    • Cristian Cadar, D.E.1    Dunbar, D.2
  • 8
    • 40449126880 scopus 로고    scopus 로고
    • Detecting buffer overflow via automatic test input data generation
    • Special Issue: Search-based Software Engineering
    • C. D. Grosso, G. Antoniol, E. Merlo, and P. Galinier. Detecting buffer overflow via automatic test input data generation. Computers and Operations Research, 35(10):3125-3143, 2008. Special Issue: Search-based Software Engineering.
    • (2008) Computers and Operations Research , vol.35 , Issue.10 , pp. 3125-3143
    • Grosso, C.D.1    Antoniol, G.2    Merlo, E.3    Galinier, P.4
  • 10
    • 33751027156 scopus 로고    scopus 로고
    • Pixy: A static analysis tool for detecting web application vulnerabilities (short paper)
    • Washington, DC, USA, IEEE Computer Society
    • N. Jovanovic, C. Kruegel, and E. Kirda. Pixy: A static analysis tool for detecting web application vulnerabilities (short paper). In SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy, pages 258-263, Washington, DC, USA, 2006. IEEE Computer Society.
    • (2006) SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy , pp. 258-263
    • Jovanovic, N.1    Kruegel, C.2    Kirda, E.3
  • 12
    • 84923564816 scopus 로고    scopus 로고
    • Finding security vulnerabilities in java applications with static analysis
    • Berkeley, CA, USA, USENIX Association
    • V. B. Livshits and M. S. Lam. Finding security vulnerabilities in java applications with static analysis. In SSYM'05: Proceedings of the 14th conference on USENIX Security Symposium, pages 271-286, Berkeley, CA, USA, 2005. USENIX Association.
    • (2005) SSYM'05: Proceedings of the 14th Conference on USENIX Security Symposium , pp. 271-286
    • Livshits, V.B.1    Lam, M.S.2
  • 17
    • 0004019724 scopus 로고
    • chapter Two approaches to interprocedural data flow analysis, Prentice Hall
    • M. Sharir and A. Pnueli. Program Flow Analysis: Theory and Applications, chapter Two approaches to interprocedural data flow analysis, pages 189-233. Prentice Hall, 1981.
    • (1981) Program Flow Analysis: Theory and Applications , pp. 189-233
    • Sharir, M.1    Pnueli, A.2
  • 18
    • 0027592833 scopus 로고
    • Extending typestate checking using conditional liveness analysis
    • May
    • R. Strom and D. Yellin. Extending typestate checking using conditional liveness analysis. Software Engineering, IEEE Transactions on, 19(5):478-485, May 1993.
    • (1993) Software Engineering, IEEE Transactions on , vol.19 , Issue.5 , pp. 478-485
    • Strom, R.1    Yellin, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.