-
1
-
-
79957964560
-
-
Google Web Toolkit. http://www.google.com/webtoolkit/.
-
Web Toolkit
-
-
-
2
-
-
80755159900
-
-
Ruby on Rails. http://www.rubyonrails.org/.
-
-
-
-
3
-
-
84948145339
-
Automated discovery of parameter pollution vulnerabilities in web applications
-
San Diego, CA, USA
-
BALDUZZI, M., GIMENEZ, C. T., BALZAROTTI, D., AND KIRDA, E. Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications. In 18th Annual Network and Distributed System Security Symposium (San Diego, CA, USA, 2011).
-
(2011)
18th Annual Network and Distributed System Security Symposium
-
-
Balduzzi, M.1
Gimenez, C.T.2
Balzarotti, D.3
Kirda, E.4
-
4
-
-
50249115131
-
Saner: Composing static and dynamic analysis to validate sanitization in web applications
-
Oakland, CA, USA
-
BALZAROTTI, D., COVA, M., FELMETSGER, V., JOVANOVIC, N., KRUEGEL, C., KIRDA, E., AND VIGNA, G. Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. In SP'08: Proceedings of the 29th IEEE Symposium on Security and Privacy (Oakland, CA, USA, 2008).
-
(2008)
SP'08: Proceedings of the 29th IEEE Symposium on Security and Privacy
-
-
Balzarotti, D.1
Cova, M.2
Felmetsger, V.3
Jovanovic, N.4
Kruegel, C.5
Kirda, E.6
Vigna, G.7
-
5
-
-
49949096891
-
Multi-module vulnerability analysis of web-based applications
-
Alexandria, Virginia, USA
-
BALZAROTTI, D., COVA, M., FELMETSGER, V. V., AND VIGNA, G. Multi-Module Vulnerability Analysis of Web-based Applications. In CCS'07: Proceedings of the 14th ACM Conference on Computer and Communications Security (Alexandria, Virginia, USA, 2007).
-
(2007)
CCS'07: Proceedings of the 14th ACM Conference on Computer and Communications Security
-
-
Balzarotti, D.1
Cova, M.2
Felmetsger, V.V.3
Vigna, G.4
-
6
-
-
84863702961
-
Server-side verification of client behavior in online games
-
San Diego, CA, USA
-
BETHEA, D., COCHRAN, R., AND REITER, M. Server-side Verification of Client Behavior in Online Games. In NDSS'10: Proceedings of the 17th Annual Network and Distributed System Security Symposium (San Diego, CA, USA, 2010).
-
(2010)
NDSS'10: Proceedings of the 17th Annual Network and Distributed System Security Symposium
-
-
Bethea, D.1
Cochran, R.2
Reiter, M.3
-
7
-
-
78649986947
-
NoTamper: Automatic blackbox detection of parameter tampering opportunities in web applications
-
Chicago, Illinois, USA
-
BISHT, P., HINRICHS, T., SKRUPSKY, N., BOBROWICZ, R., AND VENKATAKRISHNAN, V. NoTamper: Automatic Blackbox Detection of Parameter Tampering Opportunities in Web Applications. In 17th ACM Conference on Computer and Communications Security (Chicago, Illinois, USA, 2010).
-
(2010)
17th ACM Conference on Computer and Communications Security
-
-
Bisht, P.1
Hinrichs, T.2
Skrupsky, N.3
Bobrowicz, R.4
Venkatakrishnan, V.5
-
8
-
-
41149124878
-
Secure web application via automatic partitioning
-
DOI 10.1145/1294261.1294265, SOSP'07: Proceedings of the 21st ACM Symposium on Operating Systems Principles
-
CHONG, S., LIU, J., MYERS, A. C., QI, X., VIKRAM, K., ZHENG, L., AND ZHENG, X. Secure Web Application via Automatic Partitioning. SIGOPS Oper. Syst. Rev. 41, 6 (2007), 31-44. (Pubitemid 351429368)
-
(2007)
Operating Systems Review (ACM)
, pp. 31-44
-
-
Chong, S.1
Liu, J.2
Myers, A.C.3
Qi, X.4
Vikram, K.5
Zheng, L.6
Zheng, X.7
-
9
-
-
50249122466
-
Links: Web programming without tiers
-
COOPER, E., LINDLEY, S., WADLER, P., AND YALLOP, J. Links: Web programming without tiers. In FMCO (2006).
-
(2006)
FMCO
-
-
Cooper, E.1
Lindley, S.2
Wadler, P.3
Yallop, J.4
-
10
-
-
70849107905
-
Crosstier, label-based security enforcement for web applications
-
June
-
CORCORAN, B. J., SWAMY, N., AND HICKS, M. Crosstier, label-based security enforcement for web applications. In Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD) (June 2009), pp. 269-282.
-
(2009)
Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD)
, pp. 269-282
-
-
Corcoran, B.J.1
Swamy, N.2
Hicks, M.3
-
11
-
-
34548267106
-
Dynamic test input generation for database applications
-
London, UK
-
EMMI, M., MAJUMDAR, R., AND SEN, K. Dynamic Test Input Generation for Database Applications. In ISSTA'07: Proceedings of the 2007 International Symposium on Software Testing and Analysis (London, UK, 2007).
-
(2007)
ISSTA'07: Proceedings of the 2007 International Symposium on Software Testing and Analysis
-
-
Emmi, M.1
Majumdar, R.2
Sen, K.3
-
12
-
-
0036041420
-
Bugs as deviant behavior: A general approach to inferring errors in systems code
-
Banff, Alberta, Canada
-
ENGLER, D., CHEN, D. Y., HALLEM, S., CHOU, A., AND CHELF, B. Bugs as Deviant Behavior: A General Approach to Inferring Errors in Systems Code. In 18th ACM Symposium on Operating Systems Principles (Banff, Alberta, Canada, 2001).
-
(2001)
18th ACM Symposium on Operating Systems Principles
-
-
Engler, D.1
Chen, D.Y.2
Hallem, S.3
Chou, A.4
Chelf, B.5
-
13
-
-
84894088425
-
Toward automated detection of logic vulnerabilities in web applications
-
Washington, DC, USA
-
FELMETSGER, V., CAVEDON, L., KRUEGEL, C., AND VIGNA, G. Toward Automated Detection of Logic Vulnerabilities in Web Applications. In 19th USENIX Security Symposium (Washington, DC, USA, 2010).
-
(2010)
19th USENIX Security Symposium
-
-
Felmetsger, V.1
Cavedon, L.2
Kruegel, C.3
Vigna, G.4
-
14
-
-
31844450371
-
DART: Directed automated random testing
-
GODEFROID, P., KLARLUND, N., AND SEN, K. DART: Directed Automated Random Testing. SIGPLAN Not. 40, 6 (2005), 213-223.
-
(2005)
SIGPLAN Not.
, vol.40
, Issue.6
, pp. 213-223
-
-
Godefroid, P.1
Klarlund, N.2
Sen, K.3
-
15
-
-
85128730845
-
Automated whitebox fuzz testing
-
San Diego, CA, USA
-
GODEFROID, P., LEVIN, M. Y., AND MOLNAR, D. A. Automated Whitebox Fuzz Testing. In NDSS'08: Proceedings of the 15th Annual Network and Distributed System Security Symposium (San Diego, CA, USA, 2008).
-
(2008)
NDSS'08: Proceedings of the 15th Annual Network and Distributed System Security Symposium
-
-
Godefroid, P.1
Levin, M.Y.2
Molnar, D.A.3
-
16
-
-
85008255060
-
Precise interface identification to improve testing and analysis of web applications
-
Chicago, IL, USA
-
HALFOND, W., ANAND, S., AND ORSO, A. Precise Interface Identification to Improve Testing and Analysis of Web Applications. In ISSTA'09: Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis (Chicago, IL, USA, 2009).
-
(2009)
ISSTA'09: Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis
-
-
Halfond, W.1
Anand, S.2
Orso, A.3
-
17
-
-
84970882954
-
Fast and precise sanitizer analysis with BEK
-
San Francisco, CA, USA
-
HOOIMEIJER, P., LIVHSITS, B., MOLNAR, D., SAXENA, P., AND VEANES, M. Fast and Precise Sanitizer Analysis with BEK. In 20th USENIX Security Symposium (San Francisco, CA, USA, 2011).
-
(2011)
20th USENIX Security Symposium
-
-
Hooimeijer, P.1
Livhsits, B.2
Molnar, D.3
Saxena, P.4
Veanes, M.5
-
18
-
-
84927635014
-
Enforcing request integrity in web applications
-
Rome, Italy
-
JAYARAMAN, K., LEWANDOWSKI, G., TALAGA, P. G., AND CHAPIN, S. J. Enforcing Request Integrity in Web Applications. In DBSec'10: Proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (Rome, Italy, 2010).
-
(2010)
DBSec'10: Proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy
-
-
Jayaraman, K.1
Lewandowski, G.2
Talaga, P.G.3
Chapin, S.J.4
-
19
-
-
77949879017
-
Automatic creation of SQL injection and cross-site scripting attacks
-
P. M. Washington, DC, USA
-
KIEŻUN, A., J. GUO, P., JAYARAMAN, K., AND D. ERNST, M. Automatic Creation of SQL Injection and Cross-site Scripting Attacks. In ICSE'09: Proceedings of the 31st International Conference on Software Engineering (Washington, DC, USA, 2009).
-
(2009)
ICSE'09: Proceedings of the 31st International Conference on Software Engineering
-
-
Kiezun, A.1
Guo, J.2
Jayaraman, K.3
Ernst, D.4
-
20
-
-
0016971687
-
Symbolic execution and program testing
-
KING, J. C. Symbolic execution and program testing. Commun. ACM 19, 7 (1976).
-
(1976)
Commun. ACM
, vol.19
, pp. 7
-
-
King, J.C.1
-
21
-
-
77955220343
-
A symbolic execution framework for JavaScript
-
Oakland, CA, USA
-
SAXENA, P., AKHAWE, D., HANNA, S., MAO, F., MCCAMANT, S., AND SONG, D. A Symbolic Execution Framework for JavaScript. In 31st IEEE Symposium on Security and Privacy (Oakland, CA, USA, 2010).
-
(2010)
31st IEEE Symposium on Security and Privacy
-
-
Saxena, P.1
Akhawe, D.2
Hanna, S.3
Mao, F.4
Mccamant, S.5
Song, D.6
-
23
-
-
79959910753
-
A security policy oracle: Detecting security holes using multiple API implementations
-
San Jose, CA, USA
-
SRIVASTAVA, V., BOND, M. D., MCKINLEY, K. S., AND SHMATIKOV, V. A Security Policy Oracle: Detecting Security Holes using Multiple API Implementations. In ACM Conference on Programming Language Design and Implementation (San Jose, CA, USA, 2011).
-
(2011)
ACM Conference on Programming Language Design and Implementation
-
-
Srivastava, V.1
Bond, M.D.2
Mckinley, K.S.3
Shmatikov, V.4
-
24
-
-
33745811685
-
The essence of command injection attacks in web applications
-
Charleston, SC, USA
-
SU, Z., AND WASSERMANN, G. The Essence of Command Injection Attacks in Web Applications. In 33rd symposium on Principles of programming languages (Charleston, SC, USA, 2006).
-
(2006)
33rd Symposium on Principles of Programming Languages
-
-
Su, Z.1
Wassermann, G.2
-
25
-
-
84894034704
-
AutoISES: Automatically inferring security specifications and detecting violations
-
San Jose CA USA
-
TAN, L., ZHANG, X., MA, X., XIONG, W., AND ZHOU, Y. AutoISES: Automatically Inferring Security Specifications and Detecting Violations. In 17th USENIX Security Symposium (San Jose, CA, USA, 2008).
-
(2008)
17th USENIX Security Symposium
-
-
Tan, L.1
Zhang, X.2
Ma, X.3
Xiong, W.4
Zhou, Y.5
|