-
4
-
-
77953855187
-
Using parse tree validation to prevent sql injection attacks
-
New York, NY, USA, ACM
-
Gregory Buehrer, Bruce W. Weide, and Paolo A. G. Sivilotti. Using parse tree validation to prevent sql injection attacks. In SEM’05: Proceedings of the 5th international workshop on Software engineering and middleware, pages 106–113, New York, NY, USA, 2005. ACM.
-
(2005)
SEM’05: Proceedings of the 5th international workshop on Software engineering and middleware
, pp. 106-113
-
-
Buehrer, Gregory1
Weide, Bruce W.2
Sivilotti, Paolo A. G.3
-
5
-
-
27544498541
-
Defeating memory corruption attacks via pointer taintedness detection
-
S. Chen, J. Xu, N. Nakka, Z. Kalbarczyk, and R. K. Iyer. Defeating memory corruption attacks via pointer taintedness detection. In IEEE International Conference on Dependable Systems and Networks (DSN), 2005.
-
(2005)
IEEE International Conference on Dependable Systems and Networks (DSN)
-
-
Chen, S.1
Xu, J.2
Nakka, N.3
Kalbarczyk, Z.4
Iyer, R. K.5
-
6
-
-
79953842189
-
-
National Center for Biotechnology Information (NCBI). On the web at
-
National Center for Biotechnology Information (NCBI). Basic Local Alignment Search Tool (BLAST). On the web at http://www.ncbi.nlm.nih.gov/blast/Blast.cgi.
-
Basic Local Alignment Search Tool (BLAST)
-
-
-
12
-
-
70349276980
-
Privacy oracle: a system for finding application leaks with black box differential testing
-
Jaeyeon Jung, Anmol Sheth, Ben Greenstein, David Wetherall, Gabriel Maganis, and Tadayoshi Kohno. Privacy oracle: a system for finding application leaks with black box differential testing. In CCS, 2008.
-
(2008)
CCS
-
-
Jung, Jaeyeon1
Sheth, Anmol2
Greenstein, Ben3
Wetherall, David4
Maganis, Gabriel5
Kohno, Tadayoshi6
-
14
-
-
0001116877
-
Binary codes capable of correcting deletions, insertions, and reversals
-
V. I. Levenshtein. Binary codes capable of correcting deletions, insertions, and reversals. Soviet Physics Doklady, 10(707), 1966.
-
(1966)
Soviet Physics Doklady
, vol.10
, Issue.707
-
-
Levenshtein, V. I.1
-
15
-
-
70449676927
-
-
Microsoft. On the web at
-
Microsoft. IE 8 XSS Filter Architecture/ Implementation, 2008. On the web at http://blogs.technet.com/swi/archive/2008/08/19/ie-8-xss-filter-architecture-implementation.aspx.
-
(2008)
IE 8 XSS Filter Architecture/ Implementation
-
-
-
16
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
James Newsome and Dawn Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Network and Distributed System Security Symposium (NDSS), 2005.
-
(2005)
Network and Distributed System Security Symposium (NDSS)
-
-
Newsome, James1
Song, Dawn2
-
17
-
-
84871349041
-
Automatically hardening web applications using precise tainting
-
Anh Nguyen-Tuong, Salvatore Guarnieri, Doug Greene, Jeff Shirley, and David Evans. Automatically hardening web applications using precise tainting. In 20th IFIP International Information Security Conference, 2005.
-
(2005)
20th IFIP International Information Security Conference
-
-
Nguyen-Tuong, Anh1
Guarnieri, Salvatore2
Greene, Doug3
Shirley, Jeff4
Evans, David5
-
18
-
-
85180620485
-
-
University of Virginia. On the web at
-
University of Virginia. Fasta. On the web at http://fasta.bioch.virginia.edu/.
-
Fasta
-
-
-
19
-
-
84857169950
-
-
OWASP. On the web at
-
OWASP. Http response splitting. On the web at www.owasp.org/index.php/HTTP Response Splitting.
-
Http response splitting
-
-
-
20
-
-
84899740458
-
-
On the web at OWASP WebGoat Project
-
OWASP. Owasp webgoat project. On the web at http://www.owasp.org/index.php/Category: OWASP WebGoat Project.
-
Owasp webgoat project
-
-
-
22
-
-
85180622100
-
LIFT: A low-overhead practical information flow tracking system for detecting general security attacks
-
December
-
Feng Qin, Cheng Wang, Zhenmin Li, Ho seop Kim, Yuanyuan Zhou, and Youfeng Wu. LIFT: A low-overhead practical information flow tracking system for detecting general security attacks. In IEEE/ACM International Symposium on Microarchitecture, December 2006.
-
(2006)
IEEE/ACM International Symposium on Microarchitecture
-
-
Qin, Feng1
Wang, Cheng2
Li, Zhenmin3
Kim, Ho seop4
Zhou, Yuanyuan5
Wu, Youfeng6
-
24
-
-
21644444136
-
Model-carrying code: A practical approach for safe execution of untrusted applications
-
Bolton Landing, New York, October
-
R. Sekar, V. Venkatakrishnan, S. Basu, S. Bhatkar, and D. C. DuVarney. Model-carrying code: A practical approach for safe execution of untrusted applications. In ACM Symposium on Operating System Principles, Bolton Landing, New York, October 2003.
-
(2003)
ACM Symposium on Operating System Principles
-
-
Sekar, R.1
Venkatakrishnan, V.2
Basu, S.3
Bhatkar, S.4
DuVarney, D. C.5
-
26
-
-
33745811685
-
The essence of command injection attacks in web applications
-
New York, NY, USA, ACM
-
Zhendong Su and Gary Wassermann. The essence of command injection attacks in web applications. In POPL’06: Conference record of the 33rd ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pages 372–382, New York, NY, USA, 2006. ACM.
-
(2006)
POPL’06: Conference record of the 33rd ACM SIGPLAN-SIGACT symposium on Principles of programming languages
, pp. 372-382
-
-
Su, Zhendong1
Wassermann, Gary2
-
27
-
-
33845428560
-
Secure program execution via dynamic information flow tracking
-
Boston, MA, USA
-
G. Edward Suh, Jae W. Lee, David Zhang, and Srinivas Devadas. Secure program execution via dynamic information flow tracking. In International Conference on Architectural Support for Programming Languages and Operating Systems, pages 85–96, Boston, MA, USA, 2004.
-
(2004)
International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 85-96
-
-
Edward Suh, G.1
Lee, Jae W.2
Zhang, David3
Devadas, Srinivas4
-
28
-
-
85038810709
-
Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
-
August
-
Wei Xu, Sandeep Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. In USENIX Security Symposium, August 2006.
-
(2006)
USENIX Security Symposium
-
-
Xu, Wei1
Bhatkar, Sandeep2
Sekar, R.3
|