메뉴 건너뛰기




Volumn 36, Issue 4, 2010, Pages 474-494

Finding bugs in web applications using dynamic test generation and explicit-state model checking

Author keywords

dynamic analysis; PHP; reliability; Software testing; verification; Web applications

Indexed keywords

BUG REPORTS; DYNAMIC TESTS; DYNAMIC WEB APPLICATIONS; EXPERIMENTAL EVALUATION; EXPLICIT-STATE MODEL CHECKING; LOGICAL CONSTRAINTS; PHP; PROGRAMMING LANGUAGE; RELIABILITY SOFTWARE; SYMBOLIC EXECUTION; TEST INPUTS; WEB APPLICATION; WEB-PAGE;

EID: 77955423741     PISSN: 00985589     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSE.2010.31     Document Type: Article
Times cited : (129)

References (48)
  • 4
    • 85077688456 scopus 로고    scopus 로고
    • Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation
    • D. Brumley, J. Caballero, Z. Liang, J. Newsome, and D. Song, "Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation," Proc. 16th USENIX Security Symp., 2007.
    • (2007) Proc. 16th USENIX Security Symp.
    • Brumley, D.1    Caballero, J.2    Liang, Z.3    Newsome, J.4    Song, D.5
  • 8
    • 85008249099 scopus 로고    scopus 로고
    • Penumbra: Automatically identifying failure-relevant inputs using dynamic tainting
    • J. Clause and A. Orso, "Penumbra: Automatically Identifying Failure-Relevant Inputs Using Dynamic Tainting," Proc. Int'l Symp. Software Testing and Analysis, 2009.
    • (2009) Proc. Int'l Symp. Software Testing and Analysis
    • Clause, J.1    Orso, A.2
  • 13
    • 0032679915 scopus 로고    scopus 로고
    • A Deadlock detection tool for concurrent java programs
    • June
    • C. Demartini, R. Iosif, and R. Sisto, "A Deadlock Detection Tool for Concurrent Java Programs," Software-Practice and Experience, vol.29, no.7, pp. 577-603, June 1999.
    • (1999) Software-Practice and Experience , vol.29 , Issue.7 , pp. 577-603
    • Demartini, C.1    Iosif, R.2    Sisto, R.3
  • 22
    • 18944390941 scopus 로고    scopus 로고
    • The model cecker SPIN
    • G.J. Holzmann, "The Model Checker SPIN," Software Eng., vol.23, no.5, pp. 279-295, 1997.
    • (1997) Software Eng. , vol.23 , Issue.5 , pp. 279-295
    • Holzmann, G.J.1
  • 25
    • 52249111298 scopus 로고    scopus 로고
    • Evacon: A framework for integrating evolutionary and concolic testing for object-oriented programs
    • K. Inkumsah and T. Xie, "Evacon: A Framework for Integrating Evolutionary and Concolic Testing for Object-Oriented Programs," Proc. IEEE/ACM Int'l Conf. Automated Software Eng., 2007.
    • (2007) Proc. IEEE/ACM Int'l Conf. Automated Software Eng.
    • Inkumsah, K.1    Xie, T.2
  • 26
    • 35248897067 scopus 로고    scopus 로고
    • SMask: Preventing injection attacks in web applications by approximating automatic data/code separation
    • M. Johns and C. Beyerlein, "SMask: Preventing Injection Attacks in Web Applications by Approximating Automatic Data/Code Separation," Proc. ACM Symp. Applied Computing, 2007.
    • (2007) Proc. ACM Symp. Applied Computing
    • Johns, M.1    Beyerlein, C.2
  • 27
    • 33751027156 scopus 로고    scopus 로고
    • Pixy: A static analysis tool for detecting web application vulnerabilities short paper
    • N. Jovanovic, C. Kruegel, and E. Kirda, "Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)," Proc. IEEE Symp. Security and Privacy, pp. 258-263, 2006.
    • (2006) Proc. IEEE Symp. Security and Privacy , pp. 258-263
    • Jovanovic, N.1    Kruegel, C.2    Kirda, E.3
  • 30
    • 35348845024 scopus 로고    scopus 로고
    • SecuriFly: Runtime protection and recovery from web application vulnerabilities
    • B. Livshits, M. Martin, and M.S. Lam, "SecuriFly: Runtime Protection and Recovery from Web Application Vulnerabilities," technical report, Stanford Univ., 2006.
    • (2006) Technical Report, Stanford Univ
    • Livshits, B.1    Martin, M.2    Lam, M.S.3
  • 34
    • 33749823368 scopus 로고    scopus 로고
    • Static approximation of dynamically generated web pages
    • Y. Minamide, "Static Approximation of Dynamically Generated Web Pages," Proc. Int'l Conf. World Wide Web 2005.
    • (2005) Proc. Int'l Conf. World Wide Web
    • Minamide, Y.1
  • 38
    • 33745661661 scopus 로고    scopus 로고
    • Defending against injection attacks through context-sensitive string evaluation
    • T. Pietraszek and C.V. Berghe, "Defending against Injection Attacks through Context-Sensitive String Evaluation," Proc. Recent Advances in Intrusion Detection, pp. 124-145, 2005.
    • (2005) Proc. Recent Advances in Intrusion Detection , pp. 124-145
    • Pietraszek, T.1    Berghe, C.V.2
  • 44
    • 57349153984 scopus 로고    scopus 로고
    • Static detection of cross-site scripting vulnerabilities
    • G. Wassermann and Z. Su, "Static Detection of Cross-Site Scripting Vulnerabilities," Proc. Int'l Conf. Software Eng., pp. 171- 180, 2008.
    • (2008) Proc. Int'l Conf. Software Eng. , pp. 171-180
    • Wassermann, G.1    Su, Z.2
  • 46
    • 84910681237 scopus 로고    scopus 로고
    • Static detection of security vulnerabilities in scripting languages
    • Y. Xie and A. Aiken, "Static Detection of Security Vulnerabilities in Scripting Languages," Proc. Conf. USENIX Security Symp., pp. 179-192, 2006.
    • (2006) Proc. Conf. USENIX Security Symp. , pp. 179-192
    • Xie, Y.1    Aiken, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.