메뉴 건너뛰기




Volumn , Issue , 2011, Pages 343-354

A security policy oracle: Detecting security holes using multiple API implementations

Author keywords

access control; authorization; java class libraries; security; static analysis

Indexed keywords

APPLICATION PROGRAMMING INTERFACES (API); AUTHORIZATION; JAVA PROGRAMMING LANGUAGE; LIBRARIES; NETWORK SECURITY; PROGRAM DEBUGGING; SECURITY SYSTEMS;

EID: 79959910753     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1993498.1993539     Document Type: Conference Paper
Times cited : (45)

References (39)
  • 3
    • 0029222025 scopus 로고
    • On finding duplication and near-duplication in large software systems
    • B. S. Baker. On finding duplication and near-duplication in large software systems. In IEEE Working Conference on Reverse Engineering, pages 86-95, 1995.
    • (1995) IEEE Working Conference on Reverse Engineering , pp. 86-95
    • Baker, B.S.1
  • 8
  • 16
    • 84874114744 scopus 로고    scopus 로고
    • Google. Google Apps. http://www.google.com/apps/.
    • Google Apps
  • 18
    • 24344495245 scopus 로고    scopus 로고
    • Error checking with client-driven pointer analysis
    • DOI 10.1016/j.scico.2005.02.005, PII S0167642305000456, Static Analysis Symposium 2003
    • S. Z. Guyer and C. Lin. Error checking with client-driven pointer analysis. Science of Computer Programming, 58(1-2):83-114, 2005. (Pubitemid 41261378)
    • (2005) Science of Computer Programming , vol.58 , Issue.1-2 , pp. 83-114
    • Guyer, S.Z.1    Lin, C.2
  • 20
    • 77956385334 scopus 로고    scopus 로고
    • IBM. Cloud Computing. http://ibm.com/developerworks/cloud/.
    • Cloud Computing
  • 23
    • 0034770139 scopus 로고    scopus 로고
    • Identifying similar code with program dependence graphs
    • J. Krinke. Identifying similar code with program dependence graphs. In IEEEWorking Conference on Reverse Engineering, pages 301-309, 2001.
    • (2001) IEEEWorking Conference on Reverse Engineering , pp. 301-309
    • Krinke, J.1
  • 27
    • 0025548384 scopus 로고
    • Properties of data flow frameworks
    • T. J. Marlowe and B. G. Ryder. Properties of data flow frameworks. Acta Informatics (ACTA), 28(2):121-163, 1990.
    • (1990) Acta Informatics (ACTA) , vol.28 , Issue.2 , pp. 121-163
    • Marlowe, T.J.1    Ryder, B.G.2
  • 29
    • 79959868489 scopus 로고    scopus 로고
    • Salesforce. Salesforce Platform. http://www.salesforce.com/platform/.
    • Salesforce Platform
  • 33
    • 85183720125 scopus 로고    scopus 로고
    • submitted to Sun JDK, Jan-Oct
    • V. Srivastava. Vulnerabilities submitted to Sun JDK, Jan-Oct 2010. http://bugs.sun.com/bugdatabase/view-bug.do?bug-id=6914460.
    • (2010) Vulnerabilities
    • Srivastava, V.1
  • 35
    • 84894034704 scopus 로고    scopus 로고
    • AutoISES: Automatically inferring security specifications and detecting violations
    • L. Tan, X. Zhang, X. Ma, W. Xiong, and Y. Zhou. AutoISES: Automatically inferring security specifications and detecting violations. In USENIX Security Symposium, pages 379-394, 2008.
    • (2008) USENIX Security Symposium , pp. 379-394
    • Tan, L.1    Zhang, X.2    Ma, X.3    Xiong, W.4    Zhou, Y.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.