메뉴 건너뛰기




Volumn , Issue , 2010, Pages 535-542

A string constraint solver for detecting web application vulnerability

Author keywords

[No Author keywords available]

Indexed keywords

ATTACK PATTERNS; ATTACK SIGNATURE; BYTECODES; CONSTRAINT SOLVERS; CONSTRAINT SOLVING; FINITE STATE TRANSDUCERS; LINEAR STRINGS; PATH CONDITION; RECURSIVE ALGORITHMS; SECURITY ANALYSIS; SOFTWARE SYSTEMS; TARGET SYSTEMS; WEB APPLICATION; WEB APPLICATION VULNERABILITY;

EID: 79952423152     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (25)

References (23)
  • 4
    • 79952406186 scopus 로고    scopus 로고
    • available at
    • CIRT INC. Nikto. available at http://www.cirt.net/nikto2.
    • CIRT INC. Nikto
  • 5
  • 12
    • 84878203695 scopus 로고
    • Regular models of phonological rule systems
    • R. M. Kaplan and M. Kay. Regular models of phonological rule systems. Computational Linguistic, 20(3):331-378, 1994.
    • (1994) Computational Linguistic , vol.20 , Issue.3 , pp. 331-378
    • Kaplan, R.M.1    Kay, M.2
  • 14
    • 0016971687 scopus 로고
    • Symbolic execution and program testing
    • J. C. King. Symbolic execution and program testing. Communications of the ACM, 19(7):385-394, 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.7 , pp. 385-394
    • King, J.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.