-
1
-
-
0004072686
-
-
Addison-Wesley, Boston, MA, USA
-
A.V. Aho, R. Sethi and J.D. Ullman, Compilers: Principles, Techniques, and Tools, Addison-Wesley, Boston, MA, USA, 1986.
-
(1986)
Compilers: Principles, Techniques, and Tools
-
-
Aho, A.V.1
Sethi, R.2
Ullman, J.D.3
-
3
-
-
65349145047
-
Using programmer-written compiler extensions to catch security holes
-
Oakland, CA, USA
-
K. Ashcraft and D. Engler, Using programmer-written compiler extensions to catch security holes, in: IEEE Symposium on Security and Privacy, Oakland, CA, USA, 2002.
-
(2002)
IEEE Symposium on Security and Privacy
-
-
Ashcraft, K.1
Engler, D.2
-
4
-
-
77957110564
-
-
BugTraqr, BugTraq Mailing List Archive, 2005, http://www.securityfocus. com/archive/1.
-
(2005)
BugTraqr
-
-
-
6
-
-
0025444591
-
Analysis of pointers and structures
-
White Plains, NY, USA
-
D. Chase, M. Wegman and F.K. Zadeck, Analysis of pointers and structures, in: PLDI'90: Proceedings of the ACM SIGPLAN'90 Conference on Programming Language Design and Implementation, White Plains, NY, USA, 1991.
-
(1991)
PLDI'90: Proceedings of the ACM SIGPLAN'90 Conference on Programming Language Design and Implementation
-
-
Chase, D.1
Wegman, M.2
Zadeck, F.K.3
-
7
-
-
4544287282
-
Precise analysis of string expressions
-
San Diego, CA, USA
-
A. Christensen, A. Møller and M. Schwartzbach, Precise analysis of string expressions, in: International Static Analysis Symposium (SAS), San Diego, CA, USA, 2003.
-
(2003)
International Static Analysis Symposium (SAS)
-
-
Christensen, A.1
Møller, A.2
Schwartzbach, M.3
-
10
-
-
84975277890
-
Checking system rules using system-specific, programmer-written compiler extensions
-
Denver, CO, USA
-
D. Engler, B. Chelf, A. Chou and S. Hallem, Checking system rules using system-specific, programmer-written compiler extensions, in: OSDI 2000, Denver, CO, USA, 2000.
-
(2000)
OSDI 2000
-
-
Engler, D.1
Chelf, B.2
Chou, A.3
Hallem, S.4
-
11
-
-
0036041420
-
Bugs as deviant behavior: A general approach to inferring errors in systems code
-
Banff, Canada
-
D. Engler, D.Y. Chen, S. Hallem, A. Chou and B. Chelf, Bugs as deviant behavior: A general approach to inferring errors in systems code, in: SOSP'01: Proceedings of the 18th ACM Symposium on Operating Systems Principles, Banff, Canada, 2001.
-
(2001)
SOSP'01: Proceedings of the 18th ACM Symposium on Operating Systems Principles
-
-
Engler, D.1
Chen, D.Y.2
Hallem, S.3
Chou, A.4
Chelf, B.5
-
12
-
-
17244369093
-
A theory of type qualifiers
-
Atlanta, GA, USA
-
J.S. Foster, M. Faehndrich and A. Aiken, A theory of type qualifiers, in: PLDI'99: Proceedings of the ACM SIGPLAN 1999 Conference on Programming Language Design and Implementation, Atlanta, GA, USA, 1999.
-
(1999)
PLDI'99: Proceedings of the ACM SIGPLAN 1999 Conference on Programming Language Design and Implementation
-
-
Foster, J.S.1
Faehndrich, M.2
Aiken, A.3
-
13
-
-
77952407110
-
AMNESIA: Analysis and monitoring for NEutralizing SQL-injection attacks
-
Long Beach, CA, USA
-
W. Halfond and A. Orso, AMNESIA: Analysis and Monitoring for NEutralizing SQL-Injection Attacks, in: International Conference on Automated Software Engineering (ASE), Long Beach, CA, USA, 2005.
-
(2005)
International Conference on Automated Software Engineering (ASE)
-
-
Halfond, W.1
Orso, A.2
-
15
-
-
84880450431
-
Web application security assessment by fault injection and behavior monitoring
-
Budapest, Hungary
-
Y.-W. Huang, S.-K. Huang, T.-P. Lin and C.-H. Tsai, Web application security assessment by fault injection and behavior monitoring, in: WWW'03: Proceedings of the 12th International Conference on World Wide Web, Budapest, Hungary, 2003.
-
(2003)
WWW'03: Proceedings of the 12th International Conference on World Wide Web
-
-
Huang, Y.-W.1
Huang, S.-K.2
Lin, T.-P.3
Tsai, C.-H.4
-
16
-
-
19944365247
-
Securing web application code by static analysis and runtime protection
-
New York, NY, USA
-
Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D.-T. Lee and S.-Y. Kuo, Securing web application code by static analysis and runtime protection, in: WWW'04: Proceedings of the 13th International Conference on World Wide Web, New York, NY, USA, 2004.
-
(2004)
WWW'04: Proceedings of the 13th International Conference on World Wide Web
-
-
Huang, Y.-W.1
Yu, F.2
Hang, C.3
Tsai, C.-H.4
Lee, D.-T.5
Kuo, S.-Y.6
-
17
-
-
4544358830
-
Verifying web applications using bounded model checking
-
Florence, Italy
-
Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D.-T. Lee and S.-Y. Kuo, Verifying web applications using bounded model checking, in: DSN, Florence, Italy, 2004.
-
(2004)
DSN
-
-
Huang, Y.-W.1
Yu, F.2
Hang, C.3
Tsai, C.-H.4
Lee, D.-T.5
Kuo, S.-Y.6
-
19
-
-
85084161650
-
Finding user/kernel pointer bugs with type inference
-
San Diego, CA, USA
-
R. Johnson and D. Wagner, Finding user/kernel pointer bugs with type inference, in: 13th USENIX Security Symposium, San Diego, CA, USA, 2004.
-
(2004)
13th USENIX Security Symposium
-
-
Johnson, R.1
Wagner, D.2
-
20
-
-
33751027156
-
Pixy: A static analysis tool for detecting web application vulnerabilities (short paper)
-
Oakland, CA, USA
-
N. Jovanovic, C. Kruegel and E. Kirda, Pixy: A static analysis tool for detecting web application vulnerabilities (Short paper), in: IEEE Symposium on Security and Privacy, Oakland, CA, USA, 2006.
-
(2006)
IEEE Symposium on Security and Privacy
-
-
Jovanovic, N.1
Kruegel, C.2
Kirda, E.3
-
23
-
-
33751032654
-
Noxes: A client-side solution for mitigating cross-site scripting attacks
-
Dijon, France
-
E. Kirda, C. Kruegel, G. Vigna and N. Jovanovic, Noxes: A client-side solution for mitigating cross-site scripting attacks, in: The 21st ACM Symposium on Applied Computing (SAC 2006), Dijon, France, 2006.
-
(2006)
The 21st ACM Symposium on Applied Computing (SAC 2006)
-
-
Kirda, E.1
Kruegel, C.2
Vigna, G.3
Jovanovic, N.4
-
24
-
-
0026987136
-
A safe approximate algorithm for interprocedural aliasing
-
San Francisco, CA, USA
-
W. Landi and B.G. Ryder, A safe approximate algorithm for interprocedural aliasing, in: PLDI'92: Proceedings of the ACM SIGPLAN 1992 Conference on Programming Language Design and Implementation, San Francisco, CA, USA, 1992.
-
(1992)
PLDI'92: Proceedings of the ACM SIGPLAN 1992 Conference on Programming Language Design and Implementation
-
-
Landi, W.1
Ryder, B.G.2
-
25
-
-
31744439555
-
Incrementalization across object abstraction
-
San Diego, CA, USA
-
Y.A. Liu, S.D. Stoller, M. Gorbovitski, T. Rothamel and Y.E. Liu, Incrementalization across object abstraction, in: OOPSLA'05: Proceedings of the 20th Annual ACM SIGPLAN Conference on Object Oriented Programming, Systems, Languages, and Applications, San Diego, CA, USA, 2005.
-
(2005)
OOPSLA'05: Proceedings of the 20th Annual ACM SIGPLAN Conference on Object Oriented Programming, Systems, Languages, and Applications
-
-
Liu, Y.A.1
Stoller, S.D.2
Gorbovitski, M.3
Rothamel, T.4
Liu, Y.E.5
-
26
-
-
33745184790
-
Finding security errors in java programs with static analysis
-
Baltimore, MD, USA, August
-
V.B. Livshits and M.S. Lam, Finding security errors in Java programs with static analysis, in: Proceedings of the 14th Usenix Security Symposium, Baltimore, MD, USA, August 2005.
-
(2005)
Proceedings of the 14th Usenix Security Symposium
-
-
Livshits, V.B.1
Lam, M.S.2
-
28
-
-
0003502903
-
-
Morgan Kaufmann, San Fransisco, CA, USA
-
S.S. Muchnick, Advanced Compiler Design and Implementation, Morgan Kaufmann, San Fransisco, CA, USA, 1997.
-
(1997)
Advanced Compiler Design and Implementation
-
-
Muchnick, S.S.1
-
29
-
-
84871349041
-
Automatically hardening web applications using precise tainting
-
Chiba, Japan
-
A. Nguyen-Tuong, S. Guarnieri, D. Greene, J. Shirley and D. Evans, Automatically hardening web applications using precise tainting, in: IFIP Security 2005, Chiba, Japan, 2005.
-
(2005)
IFIP Security 2005
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Shirley, J.4
Evans, D.5
-
30
-
-
0003818126
-
-
Springer-Verlag, New York, USA
-
F. Nielson, H.R. Nielson and C. Hankin, Principles of Program Analysis, Springer-Verlag, New York, USA, 1999.
-
(1999)
Principles of Program Analysis
-
-
Nielson, F.1
Nielson, H.R.2
Hankin, C.3
-
31
-
-
77957115832
-
-
PAG/WWW: Static program analysis, 2005, http://www.program-analysis.com.
-
(2005)
-
-
-
33
-
-
33745933622
-
Defending against injection attacks through context-sensitive string evaluation
-
Seattle, WA, USA
-
T. Pietraszek and C.V. Berghe, Defending against injection attacks through context-sensitive string evaluation, in: Recent Advances in Intrusion Detection 2005 (RAID), Seattle, WA, USA, 2005.
-
(2005)
Recent Advances in Intrusion Detection 2005 (RAID)
-
-
Pietraszek, T.1
Berghe, C.V.2
-
34
-
-
77957114449
-
-
Secure Systems Lab, Technical University of Vienna, 2006, http://www.seclab.tuwien.ac.at.
-
(2006)
-
-
-
36
-
-
85084164620
-
Detecting format string vulnerabilities with type qualifiers
-
Washington, DC, USA
-
U. Shankar, K. Talwar, J.S. Foster and D. Wagner, Detecting format string vulnerabilities with type qualifiers, in: Proceedings of the 10th USENIX Security Symposium, Washington, DC, USA, 2001.
-
(2001)
Proceedings of the 10th USENIX Security Symposium
-
-
Shankar, U.1
Talwar, K.2
Foster, J.S.3
Wagner, D.4
-
37
-
-
84860028991
-
-
available at
-
S. Shankland, Andreessen: PHP succeeding where Java isn't, 2005, available at: http://www.zdnet. com.au/news/software/soa/Andreessen-PHP- succeeding-where-Java-isn-t/0,2000061733,392181 71,00.htm.
-
(2005)
Andreessen: Php Succeeding where Java Isn't
-
-
Shankland, S.1
-
38
-
-
33745936136
-
-
Prentice-Hall, Upper Saddle River, NJ, USA Chapter 7
-
M. Sharir and A. Pnueli, Two Approaches to Interprocedural Data Flow Analysis, Prentice-Hall, Upper Saddle River, NJ, USA, 1981, Chapter 7.
-
(1981)
Two Approaches to Interprocedural Data Flow Analysis
-
-
Sharir, M.1
Pnueli, A.2
-
40
-
-
38849110791
-
The essence of command injection attacks in web applications
-
Charleston, SC, USA
-
Z. Su and G. Wassermann, The essence of command injection attacks in web applications, in: Symposium on Principles of Programming Languages (POPL), Charleston, SC, USA, 2006.
-
(2006)
Symposium on Principles of Programming Languages (POPL)
-
-
Su, Z.1
Wassermann, G.2
-
41
-
-
0004207406
-
-
2nd edn, O'Reilly & Associates, Sebastopol, CA, USA
-
L. Wall, T. Christiansen, R.L. Schwartz and S. Potter, Programming Perl, 2nd edn, O'Reilly & Associates, Sebastopol, CA, USA, 1996.
-
(1996)
Programming Perl
-
-
Wall, L.1
Christiansen, T.2
Schwartz, R.L.3
Potter, S.4
-
42
-
-
35449004893
-
Sound and precise analysis of web applications for injection vulnerabilities
-
San Diego, CA, USA
-
G. Wassermann and Z. Su, Sound and precise analysis of web applications for injection vulnerabilities, in: Conference on Programming Language Design and Implementation (PLDI), San Diego, CA, USA, 2007.
-
(2007)
Conference on Programming Language Design and Implementation (PLDI)
-
-
Wassermann, G.1
Su, Z.2
-
43
-
-
8344251741
-
Cloning-based context-sensitive pointer alias analysis using binary decision diagrams
-
Washington, DC, USA
-
J. Whaley and M.S. Lam, Cloning-based context-sensitive pointer alias analysis using binary decision diagrams, in: PLDI'04: Proceedings of the ACM SIGPLAN 2004 Conference on Programming Language Design and Implementation, Washington, DC, USA, 2004.
-
(2004)
PLDI'04: Proceedings of the ACM SIGPLAN 2004 Conference on Programming Language Design and Implementation
-
-
Whaley, J.1
Lam, M.S.2
-
44
-
-
84859282631
-
-
Wikipedia, Hasse diagram, 2005, http://en.wikipedia.org/wiki/Hasse- diagram.
-
(2005)
Wikipedia
-
-
-
45
-
-
84976841171
-
Efficient context-sensitive pointer analysis for c programs
-
La Jolla, CA, USA
-
R.P. Wilson and M.S. Lam, Efficient context-sensitive pointer analysis for c programs, in: PLDI'95: Proceedings of the ACM SIGPLAN 1995 Conference on Programming Language Design and Implementation, La Jolla, CA, USA, 1995.
-
(1995)
PLDI'95: Proceedings of the ACM SIGPLAN 1995 Conference on Programming Language Design and Implementation
-
-
Wilson, R.P.1
Lam, M.S.2
-
46
-
-
84910681237
-
Static detection of security vulnerabilities in scripting languages
-
Vancouver, BC, Canada
-
Y. Xie and A. Aiken, Static detection of security vulnerabilities in scripting languages, in: Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, 2006.
-
(2006)
Proceedings of the 15th USENIX Security Symposium
-
-
Xie, Y.1
Aiken, A.2
|