-
2
-
-
77955423741
-
Finding bugs in web applications using dynamic test generation and explicit state model checking
-
S. Artzi, A. Kiezun, J. Dolby, F. Tip, D. Dig, A. Paradkar, and M.D. Ernst. Finding bugs in web applications using dynamic test generation and explicit state model checking. IEEE Transactions on Software Engineering, 2010.
-
(2010)
IEEE Transactions on Software Engineering
-
-
Artzi, S.1
Kiezun, A.2
Dolby, J.3
Tip, F.4
Dig, D.5
Paradkar, A.6
Ernst, M.D.7
-
3
-
-
67650046439
-
Secure compilation of a multi-tier web language
-
I.G. Baltopoulos and A.D. Gordon. Secure compilation of a multi-tier web language. In TLDI, 2009.
-
(2009)
TLDI
-
-
Baltopoulos, I.G.1
Gordon, A.D.2
-
4
-
-
70349266257
-
Robust defenses for cross-site request forgery
-
ACM
-
A. Barth, C. Jackson, and J.C. Mitchell. Robust defenses for cross-site request forgery. In CCS. ACM, 2008.
-
(2008)
CCS
-
-
Barth, A.1
Jackson, C.2
Mitchell, J.C.3
-
5
-
-
51749098783
-
Refinement types for secure implementations
-
Jesper Bengtson, Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, and Sergio Maffeis. Refinement types for secure implementations. In CSF, 2008.
-
(2008)
CSF
-
-
Bengtson, J.1
Bhargavan, K.2
Fournet, C.3
Gordon, A.D.4
Maffeis, S.5
-
7
-
-
77949464016
-
Candid: Dynamic candidate evaluations for automatic prevention of SQL injection attacks
-
Prithvi Bisht, P. Madhusudan, and V. N. Venkatakrishnan. Candid: Dynamic candidate evaluations for automatic prevention of SQL injection attacks. ACM Trans. Inf. Syst. Secur., 13(2), 2010.
-
(2010)
ACM Trans. Inf. Syst. Secur.
, vol.13
, Issue.2
-
-
Bisht, P.1
Madhusudan, P.2
Venkatakrishnan, V.N.3
-
8
-
-
77954755242
-
Ur: Statically-typed metaprogramming with type-level record computation
-
Adam Chlipala. Ur: Statically-typed metaprogramming with type-level record computation. In PLDI, 2010.
-
(2010)
PLDI
-
-
Chlipala, A.1
-
9
-
-
84877700103
-
SIF: Enforcing confidentiality and integrity in web applications
-
S. Chong, K. Vikram, A.C. Myers, et al. SIF: Enforcing confidentiality and integrity in web applications. In USENIX Security, 2007.
-
(2007)
USENIX Security
-
-
Chong, S.1
Vikram, K.2
Myers, A.C.3
-
10
-
-
70849107905
-
Cross-tier, label-based security enforcement for web applications
-
Brian J. Corcoran, Nikhil Swamy, and Michael Hicks. Cross-tier, label-based security enforcement for web applications. In SIGMOD, 2009.
-
(2009)
SIGMOD
-
-
Corcoran, B.J.1
Swamy, N.2
Hicks, M.3
-
11
-
-
84894039463
-
Nemesis: Preventing authentication & access control vulnerabilities in web applications
-
M. Dalton, C. Kozyrakis, and N. Zeldovich. Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications. In USENIX Security, 2009.
-
(2009)
USENIX Security
-
-
Dalton, M.1
Kozyrakis, C.2
Zeldovich, N.3
-
12
-
-
0016949746
-
A lattice model of secure information flow
-
Dorothy E. Denning. A Lattice Model of Secure Information Flow. Communications of the ACM, 19(5), 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
-
-
Denning, D.E.1
-
14
-
-
35048817499
-
A type discipline for authorization in distributed systems
-
Cédric Fournet, Andrew D. Gordon, and Sergio Maffeis. A type discipline for authorization in distributed systems. In CSF, 2007.
-
(2007)
CSF
-
-
Fournet, C.1
Gordon, A.D.2
Maffeis, S.3
-
15
-
-
31844450371
-
DART: Directed automated random testing
-
P. Godefroid, N. Klarlund, and K. Sen. DART: Directed automated random testing. In PLDI, 2005.
-
(2005)
PLDI
-
-
Godefroid, P.1
Klarlund, N.2
Sen, K.3
-
16
-
-
84865621386
-
Using static analysis for Ajax intrusion detection
-
Arjun Guha, Shriram Krishnamurthi, and Trevor Jim. Using static analysis for Ajax intrusion detection. In WWW, 2009.
-
(2009)
WWW
-
-
Guha, A.1
Krishnamurthi, S.2
Jim, T.3
-
17
-
-
51349128453
-
SessionSafe: Implementing XSS immune session handling
-
M. Johns. SessionSafe: Implementing XSS immune session handling. ESORICS, 2006.
-
(2006)
ESORICS
-
-
Johns, M.1
-
18
-
-
78649992349
-
Pixy: A static analysis tool for detecting web application vulnerabilities
-
N. Jovanovic, C. Kruegel, and E. Kirda. Pixy: A static analysis tool for detecting web application vulnerabilities. In S&P, 2006.
-
(2006)
S&P
-
-
Jovanovic, N.1
Kruegel, C.2
Kirda, E.3
-
19
-
-
0016971687
-
King. Symbolic execution and program testing
-
James C. King. Symbolic execution and program testing. Commun. ACM, 19(7), 1976.
-
(1976)
Commun. ACM
, vol.19
, Issue.7
-
-
James, C.1
-
20
-
-
77955217182
-
Object capabilities and isolation of untrusted web applications
-
S. Maffeis, J.C. Mitchell, and A. Taly. Object capabilities and isolation of untrusted web applications. In S&P, 2010.
-
(2010)
S&P
-
-
Maffeis, S.1
Mitchell, J.C.2
Taly, A.3
-
22
-
-
77958471523
-
Defeating cross-site request forgery attacks with browser-enforced authenticity protection
-
Z. Mao, N. Li, and I. Molloy. Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection. Financial Cryptography and Data Security, 2009.
-
(2009)
Financial Cryptography and Data Security
-
-
Mao, Z.1
Li, N.2
Molloy, I.3
-
23
-
-
31744432699
-
Finding application errors and security flaws using PQL: A program query language
-
M. Martin, B. Livshits, and M.S. Lam. Finding application errors and security flaws using PQL: a program query language. In OOPSLA, 2005.
-
(2005)
OOPSLA
-
-
Martin, M.1
Livshits, B.2
Lam, M.S.3
-
24
-
-
0002891241
-
Towards a mathematical science of computation
-
J. McCarthy. Towards a mathematical science of computation. Information Processing, 62, 1962.
-
(1962)
Information Processing
, vol.62
-
-
McCarthy, J.1
-
28
-
-
77955220343
-
A symbolic execution framework for javascript
-
EECS Department, University of California, Berkeley
-
P. Saxena, D. Akhawe, S. Hanna, F. Mao, S. McCamant, and D. Song. A Symbolic Execution Framework for JavaScript, 2010. Technical Report UCB/EECS-2010-26, EECS Department, University of California, Berkeley.
-
(2010)
Technical Report UCB/EECS-2010-26
-
-
Saxena, P.1
Akhawe, D.2
Hanna, S.3
Mao, F.4
McCamant, S.5
Song, D.6
-
30
-
-
33745811685
-
The essence of command injection attacks in web applications
-
Zhendong Su and Gary Wassermann. The essence of command injection attacks in web applications. In POPL, 2006.
-
(2006)
POPL
-
-
Su, Z.1
Wassermann, G.2
-
31
-
-
70450242742
-
TAJ: Effective taint analysis for Java
-
Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu Sridharan, and Omri Weisman. TAJ: Effective taint analysis for Java. In PLDI, 2009.
-
(2009)
PLDI
-
-
Tripp, O.1
Pistoia, M.2
Fink, S.J.3
Sridharan, M.4
Weisman, O.5
-
32
-
-
74049104017
-
Ripley: Automatically securing web 2.0 applications through replicated execution
-
K. Vikram, A. Prateek, and B. Livshits. Ripley: automatically securing web 2.0 applications through replicated execution. In CCS, 2009.
-
(2009)
CCS
-
-
Vikram, K.1
Prateek, A.2
Livshits, B.3
-
33
-
-
84887309913
-
Cross-site scripting prevention with dynamic data tainting and static analysis
-
P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna. Cross-site scripting prevention with dynamic data tainting and static analysis. In NDSS, 2007.
-
(2007)
NDSS
-
-
Vogt, P.1
Nentwich, F.2
Jovanovic, N.3
Kirda, E.4
Kruegel, C.5
Vigna, G.6
-
34
-
-
35449004893
-
Sound and precise analysis of web applications for injection vulnerabilities
-
Gary Wassermann and Zhendong Su. Sound and precise analysis of web applications for injection vulnerabilities. In PLDI, 2007.
-
(2007)
PLDI
-
-
Wassermann, G.1
Su, Z.2
-
35
-
-
78649988383
-
-
Web Application Security Consortium
-
Web Application Security Consortium. Web application security statistics, 2008. http://projects.webappsec.org/Web-Application-Security-Statistics.
-
(2008)
-
-
-
36
-
-
78649998038
-
Ruby on rails security
-
v2
-
Heiko Webers. Ruby on rails security, v2. OWASP report: http://www.owasp.org/images/2/26/Owasp-rails-security.pdf.
-
OWASP Report
-
-
Webers, H.1
-
37
-
-
84910681237
-
Static detection of security vulnerabilities in scripting languages
-
Y. Xie and A. Aiken. Static detection of security vulnerabilities in scripting languages. In USENIX Security, 2006.
-
(2006)
USENIX Security
-
-
Xie, Y.1
Aiken, A.2
-
38
-
-
34548253921
-
Javascript instrumentation for browser security
-
Dachuan Yu, Ajay Chander, Nayeem Islam, and Igor Serikov. Javascript instrumentation for browser security. In POPL, 2007.
-
(2007)
POPL
-
-
Yu, D.1
Chander, A.2
Islam, N.3
Serikov, I.4
|