-
1
-
-
34548177309
-
How can the developer benefit from security modeling?
-
DOI 10.1109/ARES.2007.96, 4159904, Proceedings - The Second International Conference on Availability, Reliability and Security, ARES 2007
-
S. Ardi, D. Byers, P. H. Meland, I. A. Tondel, and N. Shahmehri. How can the developer benefit from security modeling? In The Second International Conference on Availability, Reliability and Security, 2007, pages 1017 -1025, april 2007. (Pubitemid 47304316)
-
(2007)
Proceedings - Second International Conference on Availability, Reliability and Security, ARES 2007
, pp. 1017-1025
-
-
Ardi, S.1
Byers, D.2
Meland, P.H.3
Tondel, I.A.4
Shahmehri, N.5
-
2
-
-
84859089564
-
-
Atlas.ti. Atlas.ti, 2011. www.atlasti.com.
-
(2011)
Atlas.ti
-
-
-
3
-
-
50249115131
-
Saner: Composing static and dynamic analysis to validate sanitization in web applications
-
IEEE Computer Society
-
D. Balzarotti, M. Cova, V. Felmetsger, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna. Saner: Composing static and dynamic analysis to validate sanitization in web applications. In Proceedings of the 2008 IEEE Symposium on Security and Privacy, pages 387-401. IEEE Computer Society, 2008.
-
(2008)
Proceedings of the 2008 IEEE Symposium on Security and Privacy
, pp. 387-401
-
-
Balzarotti, D.1
Cova, M.2
Felmetsger, V.3
Jovanovic, N.4
Kirda, E.5
Kruegel, C.6
Vigna, G.7
-
5
-
-
84855680324
-
-
CERT. CERT Secure Coding, 2011. www.cert.org/secure-coding.
-
(2011)
CERT Secure Coding
-
-
-
7
-
-
10944267118
-
Static analysis for security
-
DOI 10.1109/MSP.2004.111
-
B. Chess and G. McGraw. Static analysis for security. IEEE Security and Privacy, 2:76-79, November 2004. (Pubitemid 40010916)
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.6
, pp. 76-79
-
-
Chess, B.1
Mcgraw, G.2
-
9
-
-
84894088425
-
Toward automated detection of logic vulnerabilities in web applications
-
USENIX Association
-
V. Felmetsger, L. Cavedon, C. Kruegel, and G. Vigna. Toward automated detection of logic vulnerabilities in web applications. In Proceedings of the 19th USENIX conference on Security, USENIX Security'10, pages 10-10. USENIX Association, 2010.
-
(2010)
Proceedings of the 19th USENIX Conference on Security, USENIX Security'10
, pp. 10-10
-
-
Felmetsger, V.1
Cavedon, L.2
Kruegel, C.3
Vigna, G.4
-
10
-
-
57449084220
-
Safeli: Sql injection scanner using symbolic execution
-
ACM
-
X. Fu and K. Qian. Safeli: Sql injection scanner using symbolic execution. In Proceedings of the 2008 workshop on Testing, analysis, and verification of web services and applications, TAV-WEB '08, pages 34-39. ACM, 2008.
-
(2008)
Proceedings of the 2008 Workshop on Testing, Analysis, and Verification of Web Services and Applications, TAV-WEB '08
, pp. 34-39
-
-
Fu, X.1
Qian, K.2
-
12
-
-
70350645346
-
Systematically eradicating data injection attacks using security-oriented program transformations
-
Springer-Verlag
-
M. Hafiz, P. Adamczyk, and R. Johnson. Systematically eradicating data injection attacks using security-oriented program transformations. In Proceedings of the 1st International Symposium on Engineering Secure Software and Systems, ESSoS '09, pages 75-90. Springer-Verlag, 2009.
-
(2009)
Proceedings of the 1st International Symposium on Engineering Secure Software and Systems, ESSoS '09
, pp. 75-90
-
-
Hafiz, M.1
Adamczyk, P.2
Johnson, R.3
-
13
-
-
19944365247
-
Securing web application code by static analysis and runtime protection
-
Thirteenth International World Wide Web Conference Proceedings, WWW2004
-
Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D.-T. Lee, and S.-Y. Kuo. Securing web application code by static analysis and runtime protection. In Proceedings of the 13th international conference on World Wide Web, WWW '04, pages 40-52. ACM, 2004. (Pubitemid 40752739)
-
(2004)
Thirteenth International World Wide Web Conference Proceedings, WWW2004
, pp. 40-52
-
-
Huang, Y.-W.1
Yu, F.2
Hang, C.3
Tsai, C.-H.4
Lee, D.T.5
Kuo, S.-Y.6
-
14
-
-
4544358830
-
Verifying web applications using bounded model checking
-
Washington, DC, USA. IEEE Computer Society
-
Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D. T. Lee, and S.-Y. Kuo. Verifying web applications using bounded model checking. In Proceedings of the 2004 International Conference on Dependable Systems and Networks, pages 199-, Washington, DC, USA, 2004. IEEE Computer Society.
-
(2004)
Proceedings of the 2004 International Conference on Dependable Systems and Networks
, pp. 199
-
-
Huang, Y.-W.1
Yu, F.2
Hang, C.3
Tsai, C.-H.4
Lee, D.T.5
Kuo, S.-Y.6
-
15
-
-
84855687002
-
-
Inqscribe. Inqscribe, 2011. www.inqscribe.com.
-
(2011)
Inqscribe
-
-
-
16
-
-
84855687003
-
-
S. Institute
-
S. Institute. SANS Institute, 2011. www.sans.org.
-
(2011)
-
-
-
17
-
-
33751027156
-
Pixy: A static analysis tool for detecting web application vulnerabilities
-
pp.-263, may
-
N. Jovanovic, C. Kruegel, and E. Kirda. Pixy: a static analysis tool for detecting web application vulnerabilities. In Security and Privacy, 2006 IEEE Symposium on, pages 6 pp. -263, may 2006.
-
(2006)
Security and Privacy, 2006 IEEE Symposium on
, pp. 6
-
-
Jovanovic, N.1
Kruegel, C.2
Kirda, E.3
-
18
-
-
63749094275
-
Why developers insert security vulnerabilities into their code
-
IEEE Computer Society
-
K. Karppinen, L. Yonkwa, and M. Lindvall. Why developers insert security vulnerabilities into their code. In Proceedings of the 2009 Second International Conferences on Advances in Computer-Human Interactions, ACHI '09, pages 289-294. IEEE Computer Society, 2009.
-
(2009)
Proceedings of the 2009 Second International Conferences on Advances in Computer-Human Interactions, ACHI '09
, pp. 289-294
-
-
Karppinen, K.1
Yonkwa, L.2
Lindvall, M.3
-
19
-
-
84987185054
-
The errors of tex
-
July
-
D. E. Knuth. The errors of tex. Softw. Pract. Exper., 19:607-685, July 1989.
-
(1989)
Softw. Pract. Exper.
, vol.19
, pp. 607-685
-
-
Knuth, D.E.1
-
20
-
-
13844317770
-
A framework and methodology for studying the causes of software errors in programming systems
-
DOI 10.1016/j.jvlc.2004.08.003, PII S1045926X04000394
-
A. J. Ko and B. A. Myers. A framework and methodology for studying the causes of software errors in programming systems. J. Vis. Lang. Comput., 16:41-84, February 2005. (Pubitemid 40262413)
-
(2005)
Journal of Visual Languages and Computing
, vol.16
, Issue.SPEC. ISS.
, pp. 41-84
-
-
Ko, A.J.1
Myers, B.A.2
-
22
-
-
85084163766
-
Automatic generation of xss and sql injection attacks with goal-directed model checking
-
USENIX Association
-
M. Martin and M. S. Lam. Automatic generation of xss and sql injection attacks with goal-directed model checking. In Proceedings of the 17th conference on Security symposium, pages 31-43. USENIX Association, 2008.
-
(2008)
Proceedings of the 17th Conference on Security Symposium
, pp. 31-43
-
-
Martin, M.1
Lam, M.S.2
-
24
-
-
84855665060
-
-
Microsoft. Microsoft SAL Annotations, 2011. http: //msdn.microsoft.com/ en-us/library/ms235402.aspx.
-
(2011)
Microsoft SAL Annotations
-
-
-
25
-
-
84855676560
-
-
Moodle. Moodle, 2011. http://moodle.org.
-
(2011)
Moodle
-
-
-
26
-
-
84855665059
-
-
Moodle. MSA-08-0013, 2011. http://moodle.org/mod/forum/discuss.php?d= 101405.
-
(2011)
MSA-08-0013
-
-
-
27
-
-
26444597311
-
Static analysis of role-based access control in j2ee applications
-
September
-
G. Naumovich and P. Centonze. Static analysis of role-based access control in j2ee applications. SIGSOFT Softw. Eng. Notes, 29:1-10, September 2004.
-
(2004)
SIGSOFT Softw. Eng. Notes
, vol.29
, pp. 1-10
-
-
Naumovich, G.1
Centonze, P.2
-
28
-
-
84855650115
-
-
OWASP. ESAPI Validator API, 2011. http://owasp-esapi-java.googlecode.com/ svn/trunk\-doc/latest/org/owasp/esapi/Validator.html.
-
(2011)
ESAPI Validator API
-
-
-
29
-
-
0004223940
-
-
Cambridge University Press, Cambridge, UK
-
J. Reason. Human Error. Cambridge University Press, Cambridge, UK, 1990.
-
(1990)
Human Error
-
-
Reason, J.1
-
30
-
-
84855665062
-
-
A. Roller. Apache Roller, 2011. http://roller.apache.org.
-
(2011)
-
-
Roller, A.1
-
31
-
-
84855665061
-
-
A. Roller. ROL-1766, 2011. https://issues.apache.org/jira/browse/ROL- 1766.
-
(2011)
-
-
Roller, A.1
-
32
-
-
77955220343
-
A symbolic execution framework for javascript
-
EECS Department, University of California, Berkeley, Mar
-
P. Saxena, D. Akhawe, S. Hanna, F. Mao, S. McCamant, and D. Song. A symbolic execution framework for javascript. Technical Report UCB/EECS-2010-26, EECS Department, University of California, Berkeley, Mar 2010.
-
(2010)
Technical Report UCB/EECS-2010-26
-
-
Saxena, P.1
Akhawe, D.2
Hanna, S.3
Mao, F.4
McCamant, S.5
Song, D.6
-
34
-
-
84855715853
-
-
Fortify SCA
-
F. Software. Fortify SCA, 2011. https://www.fortify.com/products/ fortify360/source-code-analyzer.html.
-
(2011)
-
-
-
36
-
-
84855666108
-
-
2
-
VERACODE. State of Software Security Report Volume 1, 2, and 3, 2011. http://www.veracode.com/reports/index.html.
-
(2011)
State of Software Security Report
, vol.1-3
-
-
-
37
-
-
79551506907
-
Idea: Interactive support for secure software development
-
Springer- Verlag
-
J. Xie, B. Chu, and H. R. Lipford. Idea: interactive support for secure software development. In Proceedings of the Third international conference on Engineering secure software and systems, ESSoS'11, pages 248-255. Springer-Verlag, 2011.
-
(2011)
Proceedings of the Third International Conference on Engineering Secure Software and Systems, ESSoS'11
, pp. 248-255
-
-
Xie, J.1
Chu, B.2
Lipford, H.R.3
|