메뉴 건너뛰기




Volumn , Issue , 2010, Pages 607-618

NoTamper: Automatic blackbox detection of parameter tampering opportunities in web applications

Author keywords

Blackbox testing; Constraint solving; Exploit construction; Parameter tampering; Symbolic evaluation

Indexed keywords

BLACK-BOX TESTING; CONSTRAINT SOLVING; EXPLOIT CONSTRUCTION; PARAMETER TAMPERING; SYMBOLIC EVALUATION;

EID: 78649986947     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1866307.1866375     Document Type: Conference Paper
Times cited : (77)

References (25)
  • 5
    • 18444373554 scopus 로고    scopus 로고
    • A survey on tree edit distance and related problems
    • BILLE, P. A survey on tree edit distance and related problems. Theoretical Computer Science 337, 1-3 (2005), 217-239.
    • (2005) Theoretical Computer Science , vol.337 , Issue.1-3 , pp. 217-239
    • Bille, P.1
  • 7
    • 85077688456 scopus 로고    scopus 로고
    • Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation
    • Berkeley, California, USA
    • BRUMLEY, D., CABALLERO, J., LIANG, Z., NEWSOME, J., AND SONG, D. Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation. In SS'07: Proceedings of 16th USENIX Security Symposium (Berkeley, California, USA, 2007).
    • (2007) SS'07: Proceedings of 16th USENIX Security Symposium
    • Brumley, D.1    Caballero, J.2    Liang, Z.3    Newsome, J.4    Song, D.5
  • 9
    • 31844450371 scopus 로고    scopus 로고
    • DART: Directed automated random testing
    • GODEFROID, P., KLARLUND, N., AND SEN, K. DART: Directed Automated Random Testing. SIGPLAN Not. 40, 6 (2005), 213-223.
    • (2005) SIGPLAN Not. , vol.40 , Issue.6 , pp. 213-223
    • Godefroid, P.1    Klarlund, N.2    Sen, K.3
  • 14
    • 84923564816 scopus 로고    scopus 로고
    • Finding security vulnerabilities in java applications with static analysis
    • Baltimore, Maryland, USA
    • LIVSHITS, V. B., AND LAM, M. S. Finding Security Vulnerabilities in Java Applications with Static Analysis. In SS'05: Proceedings of the 14th USENIX Security Symposium (Baltimore, Maryland, USA, 2005).
    • (2005) SS'05: Proceedings of the 14th USENIX Security Symposium
    • Livshits, V.B.1    Lam, M.S.2
  • 16
    • 0040966631 scopus 로고
    • Pattern matching: The gestalt approach
    • July
    • RATCLIFF, J. W., AND METZENER, D. Pattern Matching: The Gestalt Approach. Dr. Dobbs Journal (July 1988), 46.
    • (1988) Dr Dobbs Journal , pp. 46
    • Ratcliff, J.W.1    Metzener, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.