메뉴 건너뛰기




Volumn , Issue , 2010, Pages 585-594

Symbolic security analysis of Ruby-on-Rails web applications

Author keywords

Automated analysis; Symbolic execution; Web application security

Indexed keywords

APPLICATION-SPECIFIC; AUTOMATED ANALYSIS; CROSS SITE SCRIPTING; MALICIOUS ADVERSARIES; OBJECT INVARIANTS; SECRET INFORMATION; SECURITY ANALYSIS; SECURITY PROPERTIES; SECURITY VULNERABILITIES; SYMBOLIC EXECUTION; WEB APPLICATION; WEB-APPLICATION SECURITY;

EID: 78650012964     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1866307.1866373     Document Type: Conference Paper
Times cited : (45)

References (38)
  • 1
    • 77952213881 scopus 로고    scopus 로고
    • Static typing for Ruby on Rails
    • Jong-hoon An, Avik Chaudhuri, and Jeffrey S. Foster. Static typing for Ruby on Rails. In ASE, 2009.
    • (2009) ASE
    • An, J.-H.1    Chaudhuri, A.2    Foster, J.S.3
  • 3
    • 67650046439 scopus 로고    scopus 로고
    • Secure compilation of a multi-tier web language
    • I.G. Baltopoulos and A.D. Gordon. Secure compilation of a multi-tier web language. In TLDI, 2009.
    • (2009) TLDI
    • Baltopoulos, I.G.1    Gordon, A.D.2
  • 4
    • 70349266257 scopus 로고    scopus 로고
    • Robust defenses for cross-site request forgery
    • ACM
    • A. Barth, C. Jackson, and J.C. Mitchell. Robust defenses for cross-site request forgery. In CCS. ACM, 2008.
    • (2008) CCS
    • Barth, A.1    Jackson, C.2    Mitchell, J.C.3
  • 7
    • 77949464016 scopus 로고    scopus 로고
    • Candid: Dynamic candidate evaluations for automatic prevention of SQL injection attacks
    • Prithvi Bisht, P. Madhusudan, and V. N. Venkatakrishnan. Candid: Dynamic candidate evaluations for automatic prevention of SQL injection attacks. ACM Trans. Inf. Syst. Secur., 13(2), 2010.
    • (2010) ACM Trans. Inf. Syst. Secur. , vol.13 , Issue.2
    • Bisht, P.1    Madhusudan, P.2    Venkatakrishnan, V.N.3
  • 8
    • 77954755242 scopus 로고    scopus 로고
    • Ur: Statically-typed metaprogramming with type-level record computation
    • Adam Chlipala. Ur: Statically-typed metaprogramming with type-level record computation. In PLDI, 2010.
    • (2010) PLDI
    • Chlipala, A.1
  • 9
    • 84877700103 scopus 로고    scopus 로고
    • SIF: Enforcing confidentiality and integrity in web applications
    • S. Chong, K. Vikram, A.C. Myers, et al. SIF: Enforcing confidentiality and integrity in web applications. In USENIX Security, 2007.
    • (2007) USENIX Security
    • Chong, S.1    Vikram, K.2    Myers, A.C.3
  • 10
    • 70849107905 scopus 로고    scopus 로고
    • Cross-tier, label-based security enforcement for web applications
    • Brian J. Corcoran, Nikhil Swamy, and Michael Hicks. Cross-tier, label-based security enforcement for web applications. In SIGMOD, 2009.
    • (2009) SIGMOD
    • Corcoran, B.J.1    Swamy, N.2    Hicks, M.3
  • 11
    • 84894039463 scopus 로고    scopus 로고
    • Nemesis: Preventing authentication & access control vulnerabilities in web applications
    • M. Dalton, C. Kozyrakis, and N. Zeldovich. Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications. In USENIX Security, 2009.
    • (2009) USENIX Security
    • Dalton, M.1    Kozyrakis, C.2    Zeldovich, N.3
  • 12
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • Dorothy E. Denning. A Lattice Model of Secure Information Flow. Communications of the ACM, 19(5), 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5
    • Denning, D.E.1
  • 14
    • 35048817499 scopus 로고    scopus 로고
    • A type discipline for authorization in distributed systems
    • Cédric Fournet, Andrew D. Gordon, and Sergio Maffeis. A type discipline for authorization in distributed systems. In CSF, 2007.
    • (2007) CSF
    • Fournet, C.1    Gordon, A.D.2    Maffeis, S.3
  • 15
    • 31844450371 scopus 로고    scopus 로고
    • DART: Directed automated random testing
    • P. Godefroid, N. Klarlund, and K. Sen. DART: Directed automated random testing. In PLDI, 2005.
    • (2005) PLDI
    • Godefroid, P.1    Klarlund, N.2    Sen, K.3
  • 16
    • 84865621386 scopus 로고    scopus 로고
    • Using static analysis for Ajax intrusion detection
    • Arjun Guha, Shriram Krishnamurthi, and Trevor Jim. Using static analysis for Ajax intrusion detection. In WWW, 2009.
    • (2009) WWW
    • Guha, A.1    Krishnamurthi, S.2    Jim, T.3
  • 17
    • 51349128453 scopus 로고    scopus 로고
    • SessionSafe: Implementing XSS immune session handling
    • M. Johns. SessionSafe: Implementing XSS immune session handling. ESORICS, 2006.
    • (2006) ESORICS
    • Johns, M.1
  • 18
    • 78649992349 scopus 로고    scopus 로고
    • Pixy: A static analysis tool for detecting web application vulnerabilities
    • N. Jovanovic, C. Kruegel, and E. Kirda. Pixy: A static analysis tool for detecting web application vulnerabilities. In S&P, 2006.
    • (2006) S&P
    • Jovanovic, N.1    Kruegel, C.2    Kirda, E.3
  • 19
    • 0016971687 scopus 로고
    • King. Symbolic execution and program testing
    • James C. King. Symbolic execution and program testing. Commun. ACM, 19(7), 1976.
    • (1976) Commun. ACM , vol.19 , Issue.7
    • James, C.1
  • 20
    • 77955217182 scopus 로고    scopus 로고
    • Object capabilities and isolation of untrusted web applications
    • S. Maffeis, J.C. Mitchell, and A. Taly. Object capabilities and isolation of untrusted web applications. In S&P, 2010.
    • (2010) S&P
    • Maffeis, S.1    Mitchell, J.C.2    Taly, A.3
  • 22
    • 77958471523 scopus 로고    scopus 로고
    • Defeating cross-site request forgery attacks with browser-enforced authenticity protection
    • Z. Mao, N. Li, and I. Molloy. Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection. Financial Cryptography and Data Security, 2009.
    • (2009) Financial Cryptography and Data Security
    • Mao, Z.1    Li, N.2    Molloy, I.3
  • 23
    • 31744432699 scopus 로고    scopus 로고
    • Finding application errors and security flaws using PQL: A program query language
    • M. Martin, B. Livshits, and M.S. Lam. Finding application errors and security flaws using PQL: a program query language. In OOPSLA, 2005.
    • (2005) OOPSLA
    • Martin, M.1    Livshits, B.2    Lam, M.S.3
  • 24
    • 0002891241 scopus 로고
    • Towards a mathematical science of computation
    • J. McCarthy. Towards a mathematical science of computation. Information Processing, 62, 1962.
    • (1962) Information Processing , vol.62
    • McCarthy, J.1
  • 25
  • 30
    • 33745811685 scopus 로고    scopus 로고
    • The essence of command injection attacks in web applications
    • Zhendong Su and Gary Wassermann. The essence of command injection attacks in web applications. In POPL, 2006.
    • (2006) POPL
    • Su, Z.1    Wassermann, G.2
  • 32
    • 74049104017 scopus 로고    scopus 로고
    • Ripley: Automatically securing web 2.0 applications through replicated execution
    • K. Vikram, A. Prateek, and B. Livshits. Ripley: automatically securing web 2.0 applications through replicated execution. In CCS, 2009.
    • (2009) CCS
    • Vikram, K.1    Prateek, A.2    Livshits, B.3
  • 33
    • 84887309913 scopus 로고    scopus 로고
    • Cross-site scripting prevention with dynamic data tainting and static analysis
    • P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna. Cross-site scripting prevention with dynamic data tainting and static analysis. In NDSS, 2007.
    • (2007) NDSS
    • Vogt, P.1    Nentwich, F.2    Jovanovic, N.3    Kirda, E.4    Kruegel, C.5    Vigna, G.6
  • 34
    • 35449004893 scopus 로고    scopus 로고
    • Sound and precise analysis of web applications for injection vulnerabilities
    • Gary Wassermann and Zhendong Su. Sound and precise analysis of web applications for injection vulnerabilities. In PLDI, 2007.
    • (2007) PLDI
    • Wassermann, G.1    Su, Z.2
  • 35
    • 78649988383 scopus 로고    scopus 로고
    • Web Application Security Consortium
    • Web Application Security Consortium. Web application security statistics, 2008. http://projects.webappsec.org/Web-Application-Security-Statistics.
    • (2008)
  • 36
    • 78649998038 scopus 로고    scopus 로고
    • Ruby on rails security
    • v2
    • Heiko Webers. Ruby on rails security, v2. OWASP report: http://www.owasp.org/images/2/26/Owasp-rails-security.pdf.
    • OWASP Report
    • Webers, H.1
  • 37
    • 84910681237 scopus 로고    scopus 로고
    • Static detection of security vulnerabilities in scripting languages
    • Y. Xie and A. Aiken. Static detection of security vulnerabilities in scripting languages. In USENIX Security, 2006.
    • (2006) USENIX Security
    • Xie, Y.1    Aiken, A.2
  • 38
    • 34548253921 scopus 로고    scopus 로고
    • Javascript instrumentation for browser security
    • Dachuan Yu, Ajay Chander, Nayeem Islam, and Igor Serikov. Javascript instrumentation for browser security. In POPL, 2007.
    • (2007) POPL
    • Yu, D.1    Chander, A.2    Islam, N.3    Serikov, I.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.