메뉴 건너뛰기




Volumn , Issue , 2011, Pages 251-260

Patching vulnerabilities with sanitization synthesis

Author keywords

automata; sanitization synthesis; string analysis

Indexed keywords

ATTACK PATTERNS; AUTOMATA; INPUT MATCH; INPUT STRING; SANITIZATION; STRING ANALYSIS; THREE PHASIS; VULNERABILITY ANALYSIS; VULNERABILITY SIGNATURE; WEB APPLICATION;

EID: 79959887208     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1985793.1985828     Document Type: Conference Paper
Times cited : (43)

References (19)
  • 1
    • 50249115131 scopus 로고    scopus 로고
    • Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications
    • D. Balzarotti, M. Cova, V. Felmetsger, N. Jovanovic, C. Kruegel, E. Kirda, and G. Vigna. Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. In S&P, pages 387-401, 2008.
    • (2008) S&P , pp. 387-401
    • Balzarotti, D.1    Cova, M.2    Felmetsger, V.3    Jovanovic, N.4    Kruegel, C.5    Kirda, E.6    Vigna, G.7
  • 2
    • 35048877250 scopus 로고    scopus 로고
    • Widening arithmetic automata
    • C. Bartzis and T. Bultan. Widening arithmetic automata. In CAV, pages 321-333, 2004.
    • (2004) CAV , pp. 321-333
    • Bartzis, C.1    Bultan, T.2
  • 3
  • 6
    • 41149160709 scopus 로고    scopus 로고
    • Bouncer: Securing software by blocking bad input
    • M. Costa, M. Castro, L. Zhou, L. Zhang, and M. Peinado. Bouncer: securing software by blocking bad input. In SOSP, pages 117-130, 2007.
    • (2007) SOSP , pp. 117-130
    • Costa, M.1    Castro, M.2    Zhou, L.3    Zhang, L.4    Peinado, M.5
  • 7
    • 37349043549 scopus 로고    scopus 로고
    • A static analysis framework for detecting sql injection vulnerabilities
    • X. Fu, X. Lu, B. Peltsverger, S. Chen, K. Qian, and L. Tao. A static analysis framework for detecting sql injection vulnerabilities. In COMPSAC, pages 87-96, 2007.
    • (2007) COMPSAC , pp. 87-96
    • Fu, X.1    Lu, X.2    Peltsverger, B.3    Chen, S.4    Qian, K.5    Tao, L.6
  • 8
    • 4544280668 scopus 로고    scopus 로고
    • Static checking of dynamically generated queries in database applications
    • C. Gould, Z. Su, and P. Devanbu. Static checking of dynamically generated queries in database applications. In ICSE, pages 645-654, 2004.
    • (2004) ICSE , pp. 645-654
    • Gould, C.1    Su, Z.2    Devanbu, P.3
  • 9
    • 57349153984 scopus 로고    scopus 로고
    • Static detection of cross-site scripting vulnerabilities
    • G.Wassermann and Z. Su. Static detection of cross-site scripting vulnerabilities. In ICSE, pages 171-180, 2008.
    • (2008) ICSE , pp. 171-180
    • Wassermann, G.1    Su, Z.2
  • 11
    • 33751027156 scopus 로고    scopus 로고
    • Pixy: A static analysis tool for detecting web application vulnerabilities
    • N. Jovanovic, C. Krügel, and E. Kirda. Pixy: A static analysis tool for detecting web application vulnerabilities. In S&P, pages 258-263, 2006.
    • (2006) S&P , pp. 258-263
    • Jovanovic, N.1    Krügel, C.2    Kirda, E.3
  • 13
    • 33749823368 scopus 로고    scopus 로고
    • Static approximation of dynamically generated web pages
    • Y. Minamide. Static approximation of dynamically generated web pages. In WWW, pages 432-441, 2005.
    • (2005) WWW , pp. 432-441
    • Minamide, Y.1
  • 15
    • 35449004893 scopus 로고    scopus 로고
    • Sound and precise analysis of web applications for injection vulnerabilities
    • G. Wassermann and Z. Su. Sound and precise analysis of web applications for injection vulnerabilities. In PLDI, pages 32-41, 2007.
    • (2007) PLDI , pp. 32-41
    • Wassermann, G.1    Su, Z.2
  • 16
    • 77952112519 scopus 로고    scopus 로고
    • Generating vulnerability signatures for string manipulating programs using automata-based forward and backward symbolic analyses
    • F. Yu, M. Alkhalaf, and T. Bultan. Generating vulnerability signatures for string manipulating programs using automata-based forward and backward symbolic analyses. In ASE, pages 605-609, 2009.
    • (2009) ASE , pp. 605-609
    • Yu, F.1    Alkhalaf, M.2    Bultan, T.3
  • 17
    • 77951574421 scopus 로고    scopus 로고
    • Stranger: An automata-based string analysis tool for php
    • F. Yu, M. Alkhalaf, and T. Bultan. Stranger: An automata-based string analysis tool for php. In TACAS, pages 154-157, 2010.
    • (2010) TACAS , pp. 154-157
    • Yu, F.1    Alkhalaf, M.2    Bultan, T.3
  • 18
    • 54249102273 scopus 로고    scopus 로고
    • Symbolic string verification: An automata-based approach
    • F. Yu, T. Bultan, M. Cova, and O. H. Ibarra. Symbolic string verification: An automata-based approach. In SPIN, pages 306-324, 2008.
    • (2008) SPIN , pp. 306-324
    • Yu, F.1    Bultan, T.2    Cova, M.3    Ibarra, O.H.4
  • 19
    • 79959882995 scopus 로고    scopus 로고
    • Relational string verification using multi-track automata
    • F. Yu, T. Bultan, and O. H. Ibarra. Relational string verification using multi-track automata. In CIAA, 2010.
    • (2010) CIAA
    • Yu, F.1    Bultan, T.2    Ibarra, O.H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.