-
1
-
-
80755145196
-
-
ASP.NET MVC. http://www.asp.net/mvc.
-
-
-
-
2
-
-
77954485076
-
A solution for the automated detection of clickjacking attacks
-
Beijing, China, April
-
BALDUZZI, M., EGELE, M., KIRDA, E., BALZAROTTI, D., AND KRUEGEL, C. A Solution for the Automated Detection of Clickjacking Attacks. In Proceedings of the A CM Symposium on Information, Computer and Communications Security (AsiaCCS) (Beijing, China, April 2010).
-
(2010)
Proceedings of the a CM Symposium on Information, Computer and Communications Security (AsiaCCS)
-
-
Balduzzi, M.1
Egele, M.2
Kirda, E.3
Balzarotti, D.4
Kruegel, C.5
-
3
-
-
79957809946
-
Automated discovery of parameter pollution vulnerabilities in web applications
-
BALDUZZI, M., GIMENEZ, C, BALZAROTTI, D., AND KIRDA, E. Automated discovery of parameter pollution vulnerabilities in web applications. In Proceedings of the 18th Network and Distributed System Security Symposium (2011).
-
(2011)
Proceedings of the 18th Network and Distributed System Security Symposium
-
-
Balduzzi, M.1
Gimenez, C.2
Balzarotti, D.3
Kirda, E.4
-
4
-
-
49949096891
-
Multi-module vulnerability analysis of web-based applications
-
New York, NY, USA CCS '07, ACM
-
BALZAROTTI, D., COVA, M., FELMETSGER, V. V., AND VIGNA, G. Multi-module vulnerability analysis of web-based applications. In Proceedings of the 14th ACM conference on Computer and communications security (New York, NY, USA, 2007), CCS '07, ACM, pp. 25-35.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 25-35
-
-
Balzarotti, D.1
Cova, M.2
Felmetsger, V.V.3
Vigna, G.4
-
8
-
-
0004285392
-
-
1st ed. Prentice Hall PTR, Upper Saddle River, NJ, USA
-
BOEHM, B. W. Software Engineering Economics, 1st ed. Prentice Hall PTR, Upper Saddle River, NJ, USA, 1981.
-
(1981)
Software Engineering Economics
-
-
Boehm, B.W.1
-
9
-
-
80755144146
-
-
https://trac.cakephp.org/ticket/1076, August
-
Include exit with a redirect call, http://replay.web.archive.org/ 20061011152124/ https://trac.cakephp.org/ticket/1076, August 2006.
-
(2006)
Include Exit with a Redirect Call
-
-
-
10
-
-
80755188421
-
-
https://trac.cakephp.org/ticket/1358, August
-
docs should mention redirect does not "exit" a script. http://replay.web.archive.org/20061011180440/ https://trac.cakephp.org/ticket/ 1358, August 2006.
-
(2006)
Docs Should Mention Redirect Does Not "exit," a Script
-
-
-
11
-
-
80755160322
-
-
CAKE SOFTWARE FOUNDATION, INC. The CakePHP 1.3 Book. http://book.cakephp. org/view/982/redirect, 2011.
-
(2011)
The CakePHP 1.3 Book
-
-
-
14
-
-
77955027753
-
Organizing large scale hacking competitions
-
Berlin, Heidelberg DIMVA'10, Springer-Verlag
-
CHILDERS, N., BOE, B., CAVALLARO, L., CAVEDON, L., COVA, M., EGELE, M., AND VIGNA, G. Organizing large scale hacking competitions. In Proceedings of the 7th international conference on Detection of intrusions and malware, and vulnerability assessment (Berlin, Heidelberg, 2010), DIMVA'10, Springer-Verlag, pp. 132-152.
-
(2010)
Proceedings of the 7th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment
, pp. 132-152
-
-
Childers, N.1
Boe, B.2
Cavallaro, L.3
Cavedon, L.4
Cova, M.5
Egele, M.6
Vigna, G.7
-
15
-
-
80755145193
-
-
DJANGO SOFTWARE FOUNDATION. Django shortcut functions. http://docs.djangoproject.com/en/dev/topics/http/shortcuts/#django.shortcuts. redirect, 2011.
-
(2011)
Django Shortcut Functions
-
-
-
16
-
-
80755145190
-
-
ELLISLAB, INC.
-
ELLISLAB, INC. Codelgniter User Guide Version 2.0.2. http://codeigniter. com/user-guide/helpers/url-helper.html, 2011.
-
(2011)
Codelgniter User Guide Version 2.0.2
-
-
-
17
-
-
84894088425
-
Toward automated detection of logic vulnerabilities in web applications
-
Washington, DC, August
-
FELMETSGER, V., CAVEDON, L., KRUEGEL, C., AND VIGNA, G. Toward Automated Detection of Logic Vulnerabilities in Web Applications. In Proceedings of the USENIX Security Symposium (Washington, DC, August 2010).
-
(2010)
Proceedings of the USENIX Security Symposium
-
-
Felmetsger, V.1
Cavedon, L.2
Kruegel, C.3
Vigna, G.4
-
18
-
-
77956333736
-
The ruby intermediate language
-
Oct.
-
FURR, M., HOON (DAVID) AN, J., FOSTER, J. S., AND HICKS, M. The Ruby intermediate language. In Proceedings of the ACM SIGPLAN Dynamic Languages Symposium (DLS) (Oct. 2009).
-
(2009)
Proceedings of the ACM SIGPLAN Dynamic Languages Symposium (DLS)
-
-
Furr, M.1
Hoon An, J.2
Foster, J.S.3
Hicks, M.4
-
19
-
-
80755188428
-
-
GitHub. http://github.com.
-
-
-
-
20
-
-
80755145192
-
-
Indictment in U.S. v. Albert Gonzalez August
-
Indictment in U.S. v. Albert Gonzalez. http://www.justice.gov/usao/ma/ news/IDTheft/Gonzalez,720Albert720-720Indictment720080508.pdf, August 2008.
-
(2008)
-
-
-
21
-
-
77954470294
-
-
September
-
HANSEN, R. Clickjacking. http://ha.ckers.org/blog/20080915/clickjacking/, September 2008.
-
(2008)
Clickjacking
-
-
Hansen, R.1
-
23
-
-
77952213881
-
Static typing for ruby on rails
-
IEEE
-
HOON AN, J., CHAUDHURI, A., AND FOSTER, J. Static typing for ruby on rails. In Proceedings of the 24th IEEE/ACM Conference on Automated Software Engineering (ASE'09) (2009), IEEE, pp. 590-594.
-
(2009)
Proceedings of the 24th IEEE/ACM Conference on Automated Software Engineering (ASE'09)
, pp. 590-594
-
-
Hoon An, J.1
Chaudhuri, A.2
Foster, J.3
-
24
-
-
19944365247
-
Securing web application code by static analysis and runtime protection
-
Thirteenth International World Wide Web Conference Proceedings, WWW2004
-
HUANG, Y.-W., YU, F., HANG, C, TSAI, C.-H., LEE, D.-T., AND KUO, S.-Y. Securing web application code by static analysis and runtime protection. In Proceedings of the 13th international conference on World Wide Web (New York, NY, USA, 2004), WWW '04, ACM, pp. 40-52. (Pubitemid 40752739)
-
(2004)
Thirteenth International World Wide Web Conference Proceedings, WWW2004
, pp. 40-52
-
-
Huang, Y.-W.1
Yu, F.2
Hang, C.3
Tsai, C.-H.4
Lee, D.T.5
Kuo, S.-Y.6
-
25
-
-
33751027156
-
Pixy: A static analysis tool for detecting web application vulnerabilities (Short paper)
-
DOI 10.1109/SP.2006.29, 1624016, Proceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006
-
JOVANOVIC, N., KRUEGEL, C, AND KIRDA, E. Pixy: A static analysis tool for detecting web application vulnerabilities (short paper). In IN 2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (2006), pp. 258-263. (Pubitemid 44753727)
-
(2006)
Proceedings - IEEE Symposium on Security and Privacy
, vol.2006
, pp. 258-263
-
-
Jovanovic, N.1
Kruegel, C.2
Kirda, E.3
-
26
-
-
33745934031
-
Precise alias analysis for static detection of web application vulnerabilities
-
PLAS 2006 - Proceedings of the 2006 Programming Languages and Analysis for Security Workshop
-
JOVANOVIC, N., KRUEGEL, C., AND KIRDA, E. Precise alias analysis for static detection of web application vulnerabilities. In Proceedings of the 2006 workshop on Programming languages and analysis for security (New York, NY, USA, 2006), PLAS '06, ACM, pp. 27-36. (Pubitemid 44059944)
-
(2006)
PLAS 2006 - Proceedings of the 2006 Programming Languages and Analysis for Security Workshop
, vol.2006
, pp. 27-36
-
-
Jovanovic, N.1
Kruegel, C.2
Kirda, E.3
-
28
-
-
84923564816
-
Finding security vulnerabilities in java applications with static analysis
-
Berkeley, CA, USA USENIX Association
-
LIVSHITS, V. B., AND LAM, M. S. Finding security vulnerabilities in Java applications with static analysis. In Proceedings of the 14th conference on USENIX Security Symposium - Volume 14 (Berkeley, CA, USA, 2005), USENIX Association, pp. 18-18.
-
(2005)
Proceedings of the 14th Conference on USENIX Security Symposium
, vol.14
, pp. 18-18
-
-
Livshits, V.B.1
Lam, M.S.2
-
29
-
-
84877838219
-
-
OPEN WEB APPLICATION SECURITY PROJECT (OWASP). OWASP Top Ten Project. http://www.owasp.org/index.php/Top-10, 2010.
-
(2010)
OWASP Top Ten Project
-
-
-
30
-
-
80755145189
-
-
Outcome of sentencing in U.S. v. Albert Gonzalez March
-
ORTIZ, C. Outcome of sentencing in U.S. v. Albert Gonzalez. http://www.justice.gov/usao/ma/news/IDTheft/09-CR-10382/ G0NZALEZ%20website%20info%205-11-10.pdf, March 2010.
-
(2010)
-
-
Ortiz, C.1
-
34
-
-
80755144144
-
-
SPRINGSOURCE
-
SPRINGSOURCE. Contollers - Redirects. http://www.grails.org/Controllers+- +Redirects, 2010.
-
(2010)
Contollers - Redirects
-
-
-
35
-
-
80051991045
-
How to shop for free online - Security analysis of cashier-as-a-service based web stores
-
Oakland, CA, May IEEE
-
WANG, R., CHEN, S., WANG, X., AND QADEER, S. How to shop for free online - security analysis of cashier-as-a-service based web stores. In Proceedings of the 32nd IEEE Symposium on Security and Privacy (Oakland, CA, May 2011), IEEE.
-
(2011)
Proceedings of the 32nd IEEE Symposium on Security and Privacy
-
-
Wang, R.1
Chen, S.2
Wang, X.3
Qadeer, S.4
|