메뉴 건너뛰기




Volumn , Issue , 2009, Pages

An Efficient Black-box Technique for Defeating Web Application Attacks∗

Author keywords

[No Author keywords available]

Indexed keywords

C (PROGRAMMING LANGUAGE); NETWORK SECURITY;

EID: 80053015448     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (71)

References (28)
  • 6
    • 79953842189 scopus 로고    scopus 로고
    • National Center for Biotechnology Information (NCBI). On the web at
    • National Center for Biotechnology Information (NCBI). Basic Local Alignment Search Tool (BLAST). On the web at http://www.ncbi.nlm.nih.gov/blast/Blast.cgi.
    • Basic Local Alignment Search Tool (BLAST)
  • 10
    • 34547379435 scopus 로고    scopus 로고
    • Using positive tainting and syntax-aware evaluation to counter sql injection attacks
    • William G. J. Halfond, Alessandro Orso, and Panagiotis Manolios. Using positive tainting and syntax-aware evaluation to counter sql injection attacks. In SIGSOFT FSE, 2006.
    • (2006) SIGSOFT FSE
    • Halfond, William G. J.1    Orso, Alessandro2    Manolios, Panagiotis3
  • 14
    • 0001116877 scopus 로고
    • Binary codes capable of correcting deletions, insertions, and reversals
    • V. I. Levenshtein. Binary codes capable of correcting deletions, insertions, and reversals. Soviet Physics Doklady, 10(707), 1966.
    • (1966) Soviet Physics Doklady , vol.10 , Issue.707
    • Levenshtein, V. I.1
  • 15
    • 70449676927 scopus 로고    scopus 로고
    • Microsoft. On the web at
    • Microsoft. IE 8 XSS Filter Architecture/ Implementation, 2008. On the web at http://blogs.technet.com/swi/archive/2008/08/19/ie-8-xss-filter-architecture-implementation.aspx.
    • (2008) IE 8 XSS Filter Architecture/ Implementation
  • 16
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • James Newsome and Dawn Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Network and Distributed System Security Symposium (NDSS), 2005.
    • (2005) Network and Distributed System Security Symposium (NDSS)
    • Newsome, James1    Song, Dawn2
  • 18
    • 85180620485 scopus 로고    scopus 로고
    • University of Virginia. On the web at
    • University of Virginia. Fasta. On the web at http://fasta.bioch.virginia.edu/.
    • Fasta
  • 19
    • 84857169950 scopus 로고    scopus 로고
    • OWASP. On the web at
    • OWASP. Http response splitting. On the web at www.owasp.org/index.php/HTTP Response Splitting.
    • Http response splitting
  • 20
    • 84899740458 scopus 로고    scopus 로고
    • On the web at OWASP WebGoat Project
    • OWASP. Owasp webgoat project. On the web at http://www.owasp.org/index.php/Category: OWASP WebGoat Project.
    • Owasp webgoat project
  • 28
    • 85038810709 scopus 로고    scopus 로고
    • Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
    • August
    • Wei Xu, Sandeep Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. In USENIX Security Symposium, August 2006.
    • (2006) USENIX Security Symposium
    • Xu, Wei1    Bhatkar, Sandeep2    Sekar, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.