-
2
-
-
1542595072
-
Extending Java for high-level Web service construction
-
DOI 10.1145/945885.945890
-
A. S. Christensen, A. Møler, and M. I. Schwartzbach. Extending java for high-level web service construction. ACM Trans. Program. Lang. Syst., 25(6):814-875, 2003. (Pubitemid 41283893)
-
(2003)
ACM Transactions on Programming Languages and Systems
, vol.25
, Issue.6
, pp. 814-875
-
-
Christensen, A.S.1
Moller, A.2
Schwartzbach, M.I.3
-
3
-
-
35248891044
-
Precise analysis of string expressions
-
volume 2694 of LNCS, Springer-Verlag, June, Available from
-
A. S. Christensen, A. Møller, and M. I. Schwartzbach. Precise analysis of string expressions. In Proc. 10th International Static Analysis Symposium, SAS'03, volume 2694 of LNCS, pages 1-18. Springer-Verlag, June 2003. Available from http://www.brics.dk/JSA/.
-
(2003)
Proc. 10th International Static Analysis Symposium, SAS'03
, pp. 1-18
-
-
Christensen, A.S.1
Møller, A.2
Schwartzbach, M.I.3
-
4
-
-
79952406186
-
-
available at
-
CIRT INC. Nikto. available at http://www.cirt.net/nikto2.
-
CIRT INC. Nikto
-
-
-
6
-
-
37349043549
-
A static analysis framework for detecting SQL injection vulnerabilities
-
X. Fu, X. Lu, B. Peltsverger, S. Chen, K. Qian, and L. Tao. A Static Analysis Framework for Detecting SQL Injection Vulnerabilities. In Proceedings of 31st Annual International Computer Software and Applications Conference (COMPSAC 2007), pages 87 - 96, 2007.
-
(2007)
Proceedings of 31st Annual International Computer Software and Applications Conference (COMPSAC 2007)
, pp. 87-96
-
-
Fu, X.1
Lu, X.2
Peltsverger, B.3
Chen, S.4
Qian, K.5
Tao, L.6
-
12
-
-
84878203695
-
Regular models of phonological rule systems
-
R. M. Kaplan and M. Kay. Regular models of phonological rule systems. Computational Linguistic, 20(3):331-378, 1994.
-
(1994)
Computational Linguistic
, vol.20
, Issue.3
, pp. 331-378
-
-
Kaplan, R.M.1
Kay, M.2
-
13
-
-
85008256304
-
Hampi: A solver for string constraints
-
A. Kiezun, V. Ganesh, P. J. Guo, P. Hooimeijer, and M. D. Ernst. Hampi: A solver for string constraints. In Proc. of 2009 International Symposium on Testing and Analysis (ISSTA' 09), 2009.
-
(2009)
Proc. of 2009 International Symposium on Testing and Analysis (ISSTA' 09)
-
-
Kiezun, A.1
Ganesh, V.2
Guo, P.J.3
Hooimeijer, P.4
Ernst, M.D.5
-
14
-
-
0016971687
-
Symbolic execution and program testing
-
J. C. King. Symbolic execution and program testing. Communications of the ACM, 19(7):385-394, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.7
, pp. 385-394
-
-
King, J.C.1
-
19
-
-
84871349041
-
Automatically hardening web applications using precise tainting
-
A. Nguyen-Tuong, S. Guarnieri, D. Greene, J. Shirley, and D. Evans. Automatically hardening web applications using precise tainting. In Proceedings of the 20th IFIP International Information Security Conference, 2005.
-
(2005)
Proceedings of the 20th IFIP International Information Security Conference
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Shirley, J.4
Evans, D.5
-
23
-
-
54249102273
-
Symbolic string verification: An automata-based approach
-
F. Yu, T. Bultan, M. Cova, and O. H. Ibarra. Symbolic string verification: An automata-based approach. In Proc. of the 15th SPIN Workshop on Model Checking Software, pages 306-324, 2008.
-
(2008)
Proc. of the 15th SPIN Workshop on Model Checking Software
, pp. 306-324
-
-
Yu, F.1
Bultan, T.2
Cova, M.3
Ibarra, O.H.4
|