-
1
-
-
85040757532
-
-
OWASP, November 2009, OWASP Top Ten project 2010. <> (accessed January 2010).
-
OWASP, November 2009, OWASP Top Ten project 2010. < http://www.owasp.org> (accessed January 2010).
-
-
-
-
2
-
-
85040758824
-
-
CWE/SANS, Top 25 Most Dangerous Programming Errors. <> (accessed June 2010).
-
CWE/SANS, 2010, Top 25 Most Dangerous Programming Errors. < http://www.applicure.com/blog/cwe-sans-top-25-dangerous-programming-errors> (accessed June 2010).
-
(2010)
-
-
-
3
-
-
85040754413
-
-
CWE, June 2010, CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’). <> (accessed June 2010).
-
CWE, June 2010, CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’). < http://cwe.mitre.org/data/definitions/79.html> (accessed June 2010).
-
-
-
-
4
-
-
85040754766
-
-
OWASP, June 2010, XSS (Cross Site Scripting) Prevention Cheat Sheet. (accessed January 2010).
-
OWASP, June 2010, XSS (Cross Site Scripting) Prevention Cheat Sheet. < http://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet> (accessed January 2010).
-
-
-
-
5
-
-
85040761774
-
-
US-CERT, Microsoft.NET Framework Contains a Cross-Site Scripting Vulnerability, October 2006. <> (accessed January 2010).
-
US-CERT, Microsoft.NET Framework Contains a Cross-Site Scripting Vulnerability, October 2006. < http://www.kb.cert.org/vuls/id/455604> (accessed January 2010).
-
-
-
-
6
-
-
85040759034
-
-
May 2010, Vodafone.com XSS helps you trace unregistered “Pay As You Go” subscribers. <> (accessed June 2010).
-
May 2010, Vodafone.com XSS helps you trace unregistered “Pay As You Go” subscribers. < http://www.xssed.com/newslist> (accessed June 2010).
-
-
-
-
7
-
-
85040753330
-
-
Cross Site Scripting (XSS), May 2009. <> (accessed January 2010).
-
A. Mueller, Cross Site Scripting (XSS), May 2009. < http://elegantcode.com/2009/05/28/cross-site-scripting-xss/> (accessed January 2010).
-
-
-
Mueller, A.1
-
8
-
-
85040760644
-
-
ESAPI, OWASP Enterprise Security API. (accessed February 2010).
-
ESAPI, OWASP Enterprise Security API, 2009. < http://www.owasp.org/index.php/ESAPI#tab=Project_Details> (accessed February 2010).
-
(2009)
-
-
-
9
-
-
85040752874
-
-
July 2005, DOM based Cross Site Scripting or XSS of the Third Kind. <> (accessed April 2010).
-
A. Klein, July 2005, DOM based Cross Site Scripting or XSS of the Third Kind. < http://www.webappsec.org/projects/articles/071105.shtml> (accessed April 2010).
-
-
-
Klein, A.1
-
10
-
-
78651471115
-
Auditing the defense against cross site scripting in web applications
-
Proceedings of the 5th International Conference on Security and Cryptography (SECRYPT’10)
-
L.K. Shar, H.B.K. Tan, Auditing the defense against cross site scripting in web applications, in: Proceedings of the 5th International Conference on Security and Cryptography (SECRYPT’10), 2010, pp. 505–511.
-
(2010)
, pp. 505-511
-
-
Shar, L.K.1
Tan, H.B.K.2
-
11
-
-
0040027541
-
Interprocedural control dependence
-
Sinha, S., Harrold, M.J., Rothermel, G., Interprocedural control dependence. ACM Trans Softw Eng Methodol 10:2 (2001), 209–254.
-
(2001)
ACM Trans Softw Eng Methodol
, vol.10
, Issue.2
, pp. 209-254
-
-
Sinha, S.1
Harrold, M.J.2
Rothermel, G.3
-
12
-
-
85040761362
-
-
Soot, June 2008. Soot: a Java Optimization Framework. <> (accessed February 2009).
-
Soot, June 2008. Soot: a Java Optimization Framework. < http://www.sable.mcgill.ca/soot/> (accessed February 2009).
-
-
-
-
13
-
-
85040761092
-
-
W3C, HTML 4.01 Specification. <> (accessed April 2010).
-
W3C, 1999, HTML 4.01 Specification. < http://www.w3.org/TR/html401/> (accessed April 2010).
-
(1999)
-
-
-
14
-
-
85040754457
-
-
W3C, XHTML 1.0 Specification. <> (accessed August 2011).
-
W3C, 2002, XHTML 1.0 Specification. < http://www.w3.org/TR/xhtml1/> (accessed August 2011).
-
(2002)
-
-
-
15
-
-
85040749084
-
-
Sourceforge, Open source website. <> (accessed February 2009).
-
Sourceforge, Open source website. < http://www.sourceforge.net> (accessed February 2009).
-
-
-
-
16
-
-
85040750823
-
-
GotoCode, Open source website. <> (accessed September 2009).
-
GotoCode, Open source website. < http://www.gotocode.com> (accessed September 2009).
-
-
-
-
17
-
-
85040756291
-
-
RSnake, XSS (Cross Site Scripting) Cheat Sheet. <> (accessed March 2010).
-
RSnake, XSS (Cross Site Scripting) Cheat Sheet. < http://ha.ckers.org/xss.html> (accessed March 2010).
-
-
-
-
18
-
-
57849137358
-
On automated prepared statement generation to remove SQL injection vulnerabilities
-
Thomas, S., Williams, L., Xie, T., On automated prepared statement generation to remove SQL injection vulnerabilities. Inform. Softw. Technol. 51:3 (2009), 589–598.
-
(2009)
Inform. Softw. Technol.
, vol.51
, Issue.3
, pp. 589-598
-
-
Thomas, S.1
Williams, L.2
Xie, T.3
-
19
-
-
38949112510
-
Input validation analysis and testing
-
Hayes, J.H., Offutt, A.J., Input validation analysis and testing. Empirical Softw. Eng. 11:4 (2006), 493–522.
-
(2006)
Empirical Softw. Eng.
, vol.11
, Issue.4
, pp. 493-522
-
-
Hayes, J.H.1
Offutt, A.J.2
-
20
-
-
37049007001
-
Testing input validation in web applications through automated model recovery
-
Liu, H., Tan, H.B.K., Testing input validation in web applications through automated model recovery. J. Syst. Softw. 81:2 (2008), 222–233.
-
(2008)
J. Syst. Softw.
, vol.81
, Issue.2
, pp. 222-233
-
-
Liu, H.1
Tan, H.B.K.2
-
21
-
-
56749091982
-
Covering code behavior on input validation in functional testing
-
Liu, H., Tan, H.B.K., Covering code behavior on input validation in functional testing. Inform. Softw. Technol. 51:2 (2009), 546–553.
-
(2009)
Inform. Softw. Technol.
, vol.51
, Issue.2
, pp. 546-553
-
-
Liu, H.1
Tan, H.B.K.2
-
22
-
-
70349897832
-
MUTEC: mutation-based testing of cross site scripting
-
Proceedings of the 5th International Workshop on Software Engineering for Secure Systems (SESS’09)
-
H. Shahriar, M. Zulkernine, MUTEC: mutation-based testing of cross site scripting, in: Proceedings of the 5th International Workshop on Software Engineering for Secure Systems (SESS’09), 2009, pp. 47–53.
-
(2009)
, pp. 47-53
-
-
Shahriar, H.1
Zulkernine, M.2
-
23
-
-
33745184790
-
Finding security errors in Java programs with static analysis
-
Proceedings of the 14th Usenix Security Symposium (USENIX Security’05)
-
V.B. Livshits, M.S. Lam, Finding security errors in Java programs with static analysis, in: Proceedings of the 14th Usenix Security Symposium (USENIX Security’05), 2005, pp. 271–286.
-
(2005)
, pp. 271-286
-
-
Livshits, V.B.1
Lam, M.S.2
-
24
-
-
84910681237
-
Static detection of security vulnerabilities in scripting languages
-
Proceedings of the 15th USENIX Security Symposium (USENIX Security’06)
-
Y. Xie, A. Aiken, Static detection of security vulnerabilities in scripting languages, in: Proceedings of the 15th USENIX Security Symposium (USENIX Security’06), 2006, pp. 179–192.
-
(2006)
, pp. 179-192
-
-
Xie, Y.1
Aiken, A.2
-
25
-
-
33751027156
-
Pixy: a static analysis tool for detecting web application vulnerabilities
-
Proceedings of the IEEE Symposium on Security and Privacy (S&P’06)
-
N. Jovanovic, C. Kruegel, E. Kirda, Pixy: a static analysis tool for detecting web application vulnerabilities, in: Proceedings of the IEEE Symposium on Security and Privacy (S&P’06), 2006, pp. 258–263.
-
(2006)
, pp. 258-263
-
-
Jovanovic, N.1
Kruegel, C.2
Kirda, E.3
-
26
-
-
33749823368
-
Static approximation of dynamically generated web pages
-
Proceedings of the 14th International Conference on World Wide Web (WWW’05)
-
Y. Minamide, Static approximation of dynamically generated web pages, in: Proceedings of the 14th International Conference on World Wide Web (WWW’05), 2005, pp. 432–441.
-
(2005)
, pp. 432-441
-
-
Minamide, Y.1
-
27
-
-
57349153984
-
Static detection of cross-site scripting vulnerabilities
-
Proceedings of the 30th International Conference on Software Engineering (ICSE’08)
-
G. Wassermann, Z. Su, Static detection of cross-site scripting vulnerabilities, in: Proceedings of the 30th International Conference on Software Engineering (ICSE’08), 2008, pp. 171–180.
-
(2008)
, pp. 171-180
-
-
Wassermann, G.1
Su, Z.2
-
28
-
-
19944365247
-
Securing web application code by static analysis and runtime protection
-
Proceedings of the 13th International Conference on World Wide Web (WWW’04)
-
Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D.-T. Lee, S.-Y. Kuo, Securing web application code by static analysis and runtime protection, in: Proceedings of the 13th International Conference on World Wide Web (WWW’04), 2004, pp. 40–52.
-
(2004)
, pp. 40-52
-
-
Huang, Y.-W.1
Yu, F.2
Hang, C.3
Tsai, C.-H.4
Lee, D.-T.5
Kuo, S.-Y.6
-
29
-
-
85084163766
-
Automatic generation of XSS and SQL injection attacks with goal-directed model checking
-
Proceedings of the 17th USENIX Security Symposium (USENIX Security’08)
-
M. Martin, M.S. Lam, Automatic generation of XSS and SQL injection attacks with goal-directed model checking, in: Proceedings of the 17th USENIX Security Symposium (USENIX Security’08), 2008, pp. 31–43.
-
(2008)
, pp. 31-43
-
-
Martin, M.1
Lam, M.S.2
-
30
-
-
77950880816
-
Securing web applications with static and dynamic information flow tracking
-
Proceedings of the ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation
-
M.S. Lam, M. Martin, B. Livshits, J. Whaley, Securing web applications with static and dynamic information flow tracking, in: Proceedings of the ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation, 2008, pp. 3–12.
-
(2008)
, pp. 3-12
-
-
Lam, M.S.1
Martin, M.2
Livshits, B.3
Whaley, J.4
-
31
-
-
50249115131
-
-
Saner: composing static and dynamic analysis to validate sanitization in web applications, in: Proceedings of the IEEE Symposium on Security and Privacy
-
D. Balzarotti, et al., Saner: composing static and dynamic analysis to validate sanitization in web applications, in: Proceedings of the IEEE Symposium on Security and Privacy, 2008, pp. 387–401.
-
(2008)
, pp. 387-401
-
-
Balzarotti, D.1
-
32
-
-
57449103850
-
Dynamic test input generation for web applications
-
Proceedings of the International Symposium on Software Testing and Analysis (ISSTA’10), 249–260.
-
G. Wassermann, D. Yu, A. Chander, D. Dhurjati, H. Inamura, Z. Su, Dynamic test input generation for web applications, in: Proceedings of the International Symposium on Software Testing and Analysis (ISSTA’10), 2008, 249–260.
-
(2008)
-
-
Wassermann, G.1
Yu, D.2
Chander, A.3
Dhurjati, D.4
Inamura, H.5
Su, Z.6
-
33
-
-
77949879017
-
Automatic creation of SQL injection and cross-site scripting attacks
-
Proceedings of the 31st International Conference on Software Engineering (ICSE’09)
-
A. Kieżun, P.J. Guo, K. Jayaraman, M.D. Ernst, Automatic creation of SQL injection and cross-site scripting attacks, in: Proceedings of the 31st International Conference on Software Engineering (ICSE’09), 2009, pp. 199–209.
-
(2009)
, pp. 199-209
-
-
Kieżun, A.1
Guo, P.J.2
Jayaraman, K.3
Ernst, M.D.4
-
34
-
-
60649084590
-
XSSDS: server-side detection of cross-site scripting attacks
-
Proceedings of the Annual Computer Security Applications Conference (ACSAC’08)
-
M. Johns, B. Engelmann, J. Posegga, XSSDS: server-side detection of cross-site scripting attacks, in: Proceedings of the Annual Computer Security Applications Conference (ACSAC’08), 2008, pp. 335–344.
-
(2008)
, pp. 335-344
-
-
Johns, M.1
Engelmann, B.2
Posegga, J.3
-
35
-
-
49949119476
-
XSS-Guard: precise dynamic prevention of cross-site scripting attacks
-
Proceedings of the 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA’08)
-
P. Bisht, V.N. Venkatakrishnan, XSS-Guard: precise dynamic prevention of cross-site scripting attacks, in: Proceedings of the 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA’08), 2008, pp. 23–43.
-
(2008)
, pp. 23-43
-
-
Bisht, P.1
Venkatakrishnan, V.N.2
-
36
-
-
80053079139
-
Static enforcement of web application integrity through strong typing
-
Proceedings of the 18th USENIX Security Symposium (USENIX Security’09)
-
W. Robertson, G. Vigna, Static enforcement of web application integrity through strong typing, in: Proceedings of the 18th USENIX Security Symposium (USENIX Security’09), 2009, pp. 283–298.
-
(2009)
, pp. 283-298
-
-
Robertson, W.1
Vigna, G.2
-
37
-
-
72249104474
-
Improving application Security with Data Flow Assertions
-
Proceedings of the 22nd ACM Symposium on Operating Systems Principles (SOSP’09)
-
A. Yip, X. Wang, N. Zeldovich, M.F. Kaashoek, Improving application Security with Data Flow Assertions, in: Proceedings of the 22nd ACM Symposium on Operating Systems Principles (SOSP’09), 2009, pp. 291–304.
-
(2009)
, pp. 291-304
-
-
Yip, A.1
Wang, X.2
Zeldovich, N.3
Kaashoek, M.F.4
-
38
-
-
35348860223
-
Defeating script injection attacks with browser-enforced embedded policies
-
Proceedings of the 16th International Conference on World Wide Web (WWW’07)
-
T. Jim, N. Swamy, M. Hicks, Defeating script injection attacks with browser-enforced embedded policies, in: Proceedings of the 16th International Conference on World Wide Web (WWW’07), 2007, pp. 601–610.
-
(2007)
, pp. 601-610
-
-
Jim, T.1
Swamy, N.2
Hicks, M.3
-
39
-
-
70349595106
-
Client-side cross-site scripting protection
-
Kirda, E., Kruegel, C., Vigna, G., Jovanovic, N., Client-side cross-site scripting protection. Comput. Security 28 (2009), 592–604.
-
(2009)
Comput. Security
, vol.28
, pp. 592-604
-
-
Kirda, E.1
Kruegel, C.2
Vigna, G.3
Jovanovic, N.4
|