메뉴 건너뛰기




Volumn 15, Issue 5, 2010, Pages 556-576

An empirical investigation into open source web applications' implementation vulnerabilities

Author keywords

Classification of vulnerabilities; Empirical evaluation; Injection; Security; Vulnerability; Web applications

Indexed keywords

COMMON PROPERTY; DATA FLOW; EMPIRICAL EVALUATIONS; EMPIRICAL INVESTIGATION; EXTERNAL SYSTEMS; GOAL-QUESTION-METRIC APPROACH; LINES OF CODE; OPEN SOURCES; SECURITY VULNERABILITIES; SOURCE CODES; WEB APPLICATION; WEB APPLICATION VULNERABILITY;

EID: 77954759796     PISSN: 13823256     EISSN: 15737616     Source Type: Journal    
DOI: 10.1007/s10664-010-9131-y     Document Type: Article
Times cited : (12)

References (32)
  • 2
    • 34248348339 scopus 로고    scopus 로고
    • Measuring, analyzing and predicting security vulnerabilities in software systems
    • Alhazmi OH, Malaiya YK, Ray I (2007) Measuring, analyzing and predicting security vulnerabilities in software systems. Comput Secur J 26(3):219-228.
    • (2007) Comput Secur J , vol.26 , Issue.3 , pp. 219-228
    • Alhazmi, O.H.1    Malaiya, Y.K.2    Ray, I.3
  • 4
    • 3042806465 scopus 로고    scopus 로고
    • Short cycle time systems development
    • Baskerville R, Pries-Heje J (2004) Short cycle time systems development. Inf Syst J 14(3):237-264.
    • (2004) Inf Syst J , vol.14 , Issue.3 , pp. 237-264
    • Baskerville, R.1    Pries-Heje, J.2
  • 8
    • 0017517624 scopus 로고    scopus 로고
    • Certification of programs for secure information flow
    • New York, USA, ACM
    • Denning DE, Denning PJ (1997) Certification of programs for secure information flow. Commun ACM 20:504-513, New York, USA, ACM.
    • (1997) Commun ACM , vol.20 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 11
    • 40449091840 scopus 로고    scopus 로고
    • WASP: protecting web applications using positive tainting and syntax-aware evaluation
    • Halfond WGJ, Orso A, Manolios P (2008) WASP: protecting web applications using positive tainting and syntax-aware evaluation. IEEE Trans Softw Eng 34(1):65-81.
    • (2008) IEEE Trans Softw Eng , vol.34 , Issue.1 , pp. 65-81
    • Halfond, W.G.J.1    Orso, A.2    Manolios, P.3
  • 15
    • 33751027156 scopus 로고    scopus 로고
    • Pixy: A static analysis tool for detecting web application vulnerabilities (Short paper)
    • DOI 10.1109/SP.2006.29, 1624016, Proceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006
    • Jovanovic N, Kruegel C, Kirda E (2006) Pixy: a static analysis tool for detecting web application vulnerabilities. In 2006 IEEE Symposium on Security and Privacy, Berkeley/Oakland, CA, USA, pp 258-263. (Pubitemid 44753727)
    • (2006) Proceedings - IEEE Symposium on Security and Privacy , vol.2006 , pp. 258-263
    • Jovanovic, N.1    Kruegel, C.2    Kirda, E.3
  • 19
    • 85084163766 scopus 로고    scopus 로고
    • Automatic generation of XSS and SQL injection attacks with goal-directed model checking
    • San Jose, CA
    • Martin M, Lam M (2008) Automatic generation of XSS and SQL injection attacks with goal-directed model checking. Proceedings of the 17th conference on Security symposium, San Jose, CA, pp 31-43.
    • (2008) Proceedings of the 17th Conference on Security Symposium , pp. 31-43
    • Martin, M.1    Lam, M.2
  • 22
    • 77954758361 scopus 로고    scopus 로고
    • Top 10 2007, last accessed June 29, 2009
    • OWASP (2007) Top 10 2007. http://www.owasp.org/index.php/Top-10-2007, last accessed June 29, 2009.
    • (2007)
  • 28
    • 33745811685 scopus 로고    scopus 로고
    • The essence of command injection attacks in web applications
    • Charleston, South Carolina, USA
    • Su Z, Wassermann G (2006) The essence of command injection attacks in web applications. In The 33rd Annual Symposium on Principles of Programming Languages, Charleston, South Carolina, USA, pp 372-382.
    • (2006) 33rd Annual Symposium on Principles of Programming Languages , pp. 372-382
    • Su, Z.1    Wassermann, G.2
  • 30
    • 0000990322 scopus 로고
    • A survey of program slicing techniques
    • Tip F (1995) A survey of program slicing techniques. J Program Lang 3(3):121-189.
    • (1995) J Program Lang , vol.3 , Issue.3 , pp. 121-189
    • Tip, F.1
  • 31
    • 0021457061 scopus 로고
    • Program slicing
    • Weiser M (1984) Program slicing. IEEE Trans Softw Eng SE-10(4):352-357.
    • (1984) IEEE Trans Softw Eng , vol.SE-10 , Issue.4 , pp. 352-357
    • Weiser, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.