-
2
-
-
34248348339
-
Measuring, analyzing and predicting security vulnerabilities in software systems
-
Alhazmi OH, Malaiya YK, Ray I (2007) Measuring, analyzing and predicting security vulnerabilities in software systems. Comput Secur J 26(3):219-228.
-
(2007)
Comput Secur J
, vol.26
, Issue.3
, pp. 219-228
-
-
Alhazmi, O.H.1
Malaiya, Y.K.2
Ray, I.3
-
4
-
-
3042806465
-
Short cycle time systems development
-
Baskerville R, Pries-Heje J (2004) Short cycle time systems development. Inf Syst J 14(3):237-264.
-
(2004)
Inf Syst J
, vol.14
, Issue.3
, pp. 237-264
-
-
Baskerville, R.1
Pries-Heje, J.2
-
6
-
-
77953855187
-
Using parse tree validation to prevent SQL injection attacks
-
Lisbon, Portugal
-
Buehrer GT, Weide BW, Sivilotti PAG (2005) Using parse tree validation to prevent SQL injection attacks. In Proc. of the 5th Intl. Workshop on Software Engineering and Middleware (SEM '05), Lisbon, Portugal, pp 106-113.
-
(2005)
Proc. of the 5th Intl. Workshop on Software Engineering and Middleware (SEM '05)
, pp. 106-113
-
-
Buehrer, G.T.1
Weide, B.W.2
Sivilotti, P.A.G.3
-
7
-
-
38149011298
-
Swaddler: an approach for the anomaly-based detection of State violations in web applications
-
Cova M, Balzarotti D, Felmetsger V, Vigna G (2007) Swaddler: an approach for the anomaly-based detection of State violations in web applications, Recent Advance in Intrusion Detection (RAID), pp 63-86.
-
(2007)
Recent Advance in Intrusion Detection (RAID)
, pp. 63-86
-
-
Cova, M.1
Balzarotti, D.2
Felmetsger, V.3
Vigna, G.4
-
8
-
-
0017517624
-
Certification of programs for secure information flow
-
New York, USA, ACM
-
Denning DE, Denning PJ (1997) Certification of programs for secure information flow. Commun ACM 20:504-513, New York, USA, ACM.
-
(1997)
Commun ACM
, vol.20
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
9
-
-
77952407110
-
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks
-
Long Beach, CA, USA
-
Halfond WG, Orso A (2005) AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks. In Proceedings of 20th ACM International Conference on Automated Software Engineering (ASE), Long Beach, CA, USA, pp 174-183.
-
(2005)
Proceedings of 20th ACM International Conference on Automated Software Engineering (ASE)
, pp. 174-183
-
-
Halfond, W.G.1
Orso, A.2
-
10
-
-
34547379435
-
Using positive tainting and syntax-aware evaluation to counter SQL injection attacks
-
Portland, Oregon, USA
-
Halfond WG, Orso A, Manolios P (2006) Using positive tainting and syntax-aware evaluation to counter SQL injection attacks. In Proceedings of the 14th ACM SIGSOFT international Symposium on Foundations of Software Engineering, Portland, Oregon, USA, pp 175-185.
-
(2006)
Proceedings of the 14th ACM SIGSOFT International Symposium on Foundations of Software Engineering
, pp. 175-185
-
-
Halfond, W.G.1
Orso, A.2
Manolios, P.3
-
11
-
-
40449091840
-
WASP: protecting web applications using positive tainting and syntax-aware evaluation
-
Halfond WGJ, Orso A, Manolios P (2008) WASP: protecting web applications using positive tainting and syntax-aware evaluation. IEEE Trans Softw Eng 34(1):65-81.
-
(2008)
IEEE Trans Softw Eng
, vol.34
, Issue.1
, pp. 65-81
-
-
Halfond, W.G.J.1
Orso, A.2
Manolios, P.3
-
12
-
-
19944365247
-
Securing web application code by static analysis and runtime protection
-
New York, NY, USA: ACM Press
-
Huang YW, Yu F, Hang C, Tsai CH, Lee DT, Kuo SY (2004) Securing web application code by static analysis and runtime protection, in WWW '04: Proceedings of the 13th International Conference on World Wide Web. New York, NY, USA: ACM Press, pp 40-52.
-
(2004)
WWW '04: Proceedings of the 13th International Conference on World Wide Web
, pp. 40-52
-
-
Huang, Y.W.1
Yu, F.2
Hang, C.3
Tsai, C.H.4
Lee, D.T.5
Kuo, S.Y.6
-
13
-
-
72949084588
-
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
-
Honolulu, Hawaii
-
Liu A, Yuan Y, Wijesekera D, Stavrou A (2009) SQLProb: a proxy-based architecture towards preventing SQL injection attacks. Proceedings of the 2009 ACM symposium on Applied Computing, Honolulu, Hawaii, pp 2054-2061.
-
(2009)
Proceedings of the 2009 ACM Symposium on Applied Computing
, pp. 2054-2061
-
-
Liu, A.1
Yuan, Y.2
Wijesekera, D.3
Stavrou, A.4
-
14
-
-
85084161650
-
Finding user/kernel pointer bugs with type inference
-
San Diego, CA, USA
-
Johnson R, Wagner D (2004) Finding user/kernel pointer bugs with type inference. In Proceedings of the 2004 Usenix Security Conference, San Diego, CA, USA, pp 119-134.
-
(2004)
Proceedings of the 2004 Usenix Security Conference
, pp. 119-134
-
-
Johnson, R.1
Wagner, D.2
-
15
-
-
33751027156
-
Pixy: A static analysis tool for detecting web application vulnerabilities (Short paper)
-
DOI 10.1109/SP.2006.29, 1624016, Proceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006
-
Jovanovic N, Kruegel C, Kirda E (2006) Pixy: a static analysis tool for detecting web application vulnerabilities. In 2006 IEEE Symposium on Security and Privacy, Berkeley/Oakland, CA, USA, pp 258-263. (Pubitemid 44753727)
-
(2006)
Proceedings - IEEE Symposium on Security and Privacy
, vol.2006
, pp. 258-263
-
-
Jovanovic, N.1
Kruegel, C.2
Kirda, E.3
-
16
-
-
34250673645
-
SecuBat: a web vulnerability scanner
-
Edinburgh, Scotland
-
Kals S, Kirda E, Kruegel C, Jovanovic N (2006) SecuBat: a web vulnerability scanner. The 15th International World Wide Web Conference (WWW 2006), Edinburgh, Scotland, pp 247-256.
-
(2006)
The 15th International World Wide Web Conference (WWW 2006)
, pp. 247-256
-
-
Kals, S.1
Kirda, E.2
Kruegel, C.3
Jovanovic, N.4
-
17
-
-
77949879017
-
Automatic creation of SQL injection and cross-site scripting attacks
-
Vancouver, British Columbia, Canada
-
Kiezun A, Guo PJ, Jayaraman K, Ernst MD (2008) Automatic creation of SQL injection and cross-site scripting attacks. Proceedings of the 2009 IEEE 31st International Conference on Software Engineering, Vancouver, British Columbia, Canada, pp 199-209.
-
(2008)
Proceedings of the 2009 IEEE 31st International Conference on Software Engineering
, pp. 199-209
-
-
Kiezun, A.1
Guo, P.J.2
Jayaraman, K.3
Ernst, M.D.4
-
19
-
-
85084163766
-
Automatic generation of XSS and SQL injection attacks with goal-directed model checking
-
San Jose, CA
-
Martin M, Lam M (2008) Automatic generation of XSS and SQL injection attacks with goal-directed model checking. Proceedings of the 17th conference on Security symposium, San Jose, CA, pp 31-43.
-
(2008)
Proceedings of the 17th Conference on Security Symposium
, pp. 31-43
-
-
Martin, M.1
Lam, M.2
-
20
-
-
31744432699
-
Finding application errors and security flaws using PQL: a program query language
-
San Diego, CA, USA
-
Martin M, Livshits B, Lam MS (2005) Finding application errors and security flaws using PQL: a program query language. In OOPSLA '05: Proc. of the 20th Annual ACM SIGPLAN Conference on Object Oriented Programming Systems Languages and Applications, San Diego, CA, USA, pp 365-383.
-
(2005)
OOPSLA '05: Proc. of the 20th Annual ACM SIGPLAN Conference on Object Oriented Programming Systems Languages and Applications
, pp. 365-383
-
-
Martin, M.1
Livshits, B.2
Lam, M.S.3
-
21
-
-
84871349041
-
Automatically hardening web applications using precise tainting
-
Chiba, Japan
-
Nguyen-Tuong A, Guarnieri S, Greene D, Shirley J, Evans D (2005) Automatically hardening web applications using precise tainting. In Proceedings of the 20th IFIP International Information Security Conference, Chiba, Japan, pp 372-382.
-
(2005)
Proceedings of the 20th IFIP International Information Security Conference
, pp. 372-382
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Shirley, J.4
Evans, D.5
-
22
-
-
77954758361
-
-
Top 10 2007, last accessed June 29, 2009
-
OWASP (2007) Top 10 2007. http://www.owasp.org/index.php/Top-10-2007, last accessed June 29, 2009.
-
(2007)
-
-
-
23
-
-
33745661661
-
Defending against injection attacks through context-sensitive string evaluation
-
Seattle, Washington, USA
-
Pietraszek T, Berghe CV (2005) Defending against injection attacks through context-sensitive string evaluation. In Proceedings of Recent Advances in Intrusion Detection (RAID2005), Seattle, Washington, USA, pp 124-145.
-
(2005)
Proceedings of Recent Advances in Intrusion Detection (RAID2005)
, pp. 124-145
-
-
Pietraszek, T.1
Berghe, C.V.2
-
26
-
-
77953069969
-
Abstracting application-level web security
-
Honolulu, Hawaii, USA
-
Scott D, Sharp R (2002) Abstracting application-level web security. In Proc. of the 11th Intl. Conference on the World Wide Web (WWW 2002), Honolulu, Hawaii, USA, pp 396-407.
-
(2002)
Proc. of the 11th Intl. Conference on the World Wide Web (WWW 2002)
, pp. 396-407
-
-
Scott, D.1
Sharp, R.2
-
27
-
-
85084164620
-
Detecting format string vulnerabilities with type qualifiers
-
Washington, D.C.
-
Shankar U, Talwar K, Foster JS, Wagner D (2001) Detecting format string vulnerabilities with type qualifiers. In 10th USENIX Security Symposium, Washington, D.C., pp 201-220.
-
(2001)
10th USENIX Security Symposium
, pp. 201-220
-
-
Shankar, U.1
Talwar, K.2
Foster, J.S.3
Wagner, D.4
-
28
-
-
33745811685
-
The essence of command injection attacks in web applications
-
Charleston, South Carolina, USA
-
Su Z, Wassermann G (2006) The essence of command injection attacks in web applications. In The 33rd Annual Symposium on Principles of Programming Languages, Charleston, South Carolina, USA, pp 372-382.
-
(2006)
33rd Annual Symposium on Principles of Programming Languages
, pp. 372-382
-
-
Su, Z.1
Wassermann, G.2
-
30
-
-
0000990322
-
A survey of program slicing techniques
-
Tip F (1995) A survey of program slicing techniques. J Program Lang 3(3):121-189.
-
(1995)
J Program Lang
, vol.3
, Issue.3
, pp. 121-189
-
-
Tip, F.1
-
31
-
-
0021457061
-
Program slicing
-
Weiser M (1984) Program slicing. IEEE Trans Softw Eng SE-10(4):352-357.
-
(1984)
IEEE Trans Softw Eng
, vol.SE-10
, Issue.4
, pp. 352-357
-
-
Weiser, M.1
-
32
-
-
85084161756
-
Using CQual for static analysis of authorization hook placement
-
San Francisco, CA, USA
-
Zhang X, Edwards A, Jaeger T (2002) Using CQual for static analysis of authorization hook placement. In the Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, USA, pp 33-48.
-
(2002)
The Proceedings of the 11th USENIX Security Symposium
, pp. 33-48
-
-
Zhang, X.1
Edwards, A.2
Jaeger, T.3
|