-
1
-
-
77954612255
-
Regular expressions considered harmful in client-side xss filters
-
ACM, New York
-
Bates, D., Barth, A., Jackson, C.: Regular expressions considered harmful in client-side xss filters. In: WWW 2010: Proceedings of the 19th International Conference on World Wide Web, pp. 91-100. ACM, New York (2010)
-
(2010)
WWW 2010: Proceedings of the 19th International Conference on World Wide Web
, pp. 91-100
-
-
Bates, D.1
Barth, A.2
Jackson, C.3
-
3
-
-
78751477710
-
Familiarity breeds contempt: The honeymoon effect and the role of legacy code in zero-day vulnerabilities
-
Clark, S., Frei, S., Blaze, M., Smith, J.: Familiarity breeds contempt: The honeymoon effect and the role of legacy code in zero-day vulnerabilities. In: Annual Computer Security Applications Conference (2010)
-
Annual Computer Security Applications Conference (2010)
-
-
Clark, S.1
Frei, S.2
Blaze, M.3
Smith, J.4
-
4
-
-
78650325121
-
-
Dhamankar, R., Dausin, M., Eisenbarth, M., King, J.: The top cyber security risks (2009), http://www.sans.org/top-cyber-security-risks/
-
(2009)
The Top Cyber Security Risks
-
-
Dhamankar, R.1
Dausin, M.2
Eisenbarth, M.3
King, J.4
-
5
-
-
34248370608
-
Large-scale vulnerability analysis
-
ACM, New York
-
Frei, S., May, M., Fiedler, U., Plattner, B.: Large-scale vulnerability analysis. In: LSAD 2006: Proceedings of the 2006 SIGCOMM Workshop on Large-Scale Attack Defense, pp. 131-138. ACM, New York (2006)
-
(2006)
LSAD 2006: Proceedings of the 2006 SIGCOMM Workshop on Large-Scale Attack Defense
, pp. 131-138
-
-
Frei, S.1
May, M.2
Fiedler, U.3
Plattner, B.4
-
6
-
-
84857099505
-
-
Microsoft Inc.
-
Microsoft Inc. Msdn code analysis team blog (2010), http://blogs.msdn. com/b/codeanalysis/
-
(2010)
Msdn Code Analysis Team Blog
-
-
-
7
-
-
35348860223
-
Defeating script injection attacks with browser-enforced embedded policies
-
ACM, New York
-
Jim, T., Swamy, N., Hicks, M.: Defeating script injection attacks with browser-enforced embedded policies. In: WWW 2007: Proceedings of the 16th International Conference on World Wide Web, pp. 601-610. ACM, New York (2007)
-
(2007)
WWW 2007: Proceedings of the 16th International Conference on World Wide Web
, pp. 601-610
-
-
Jim, T.1
Swamy, N.2
Hicks, M.3
-
8
-
-
77949451836
-
Secure Code Generation for Web Applications
-
Massacci, F., Wallach, D., Zannone, N. (eds.) ESSoS 2010. Springer, Heidelberg
-
Johns, M., Beyerlein, C., Giesecke, R., Posegga, J.: Secure Code Generation for Web Applications. In: Massacci, F., Wallach, D., Zannone, N. (eds.) ESSoS 2010. LNCS, vol. 5965, pp. 96-113. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5965
, pp. 96-113
-
-
Johns, M.1
Beyerlein, C.2
Giesecke, R.3
Posegga, J.4
-
9
-
-
33751027156
-
A static analysis tool for detecting web application vulnerabilities (short paper)
-
IEEE Computer Society, Washington, DC
-
Jovanovic, N., Kruegel, C., Kirda, E.: Pixy: A static analysis tool for detecting web application vulnerabilities (short paper). In: SP 2006: Proceedings of the 2006 IEEE Symposium on Security and Privacy, pp. 258-263. IEEE Computer Society, Washington, DC (2006)
-
(2006)
SP 2006: Proceedings of the 2006 IEEE Symposium on Security and Privacy
, pp. 258-263
-
-
Jovanovic, N.1
Kruegel, C.2
Kirda, E.P.3
-
10
-
-
33751032654
-
Noxes: A client-side solution for mitigating cross-site scripting attacks
-
ACM, New York
-
Kirda, E., Kruegel, C., Vigna, G., Jovanovic, N.: Noxes: a client-side solution for mitigating cross-site scripting attacks. In: SAC 2006: Proceedings of the 2006 ACM Symposium on Applied Computing, pp. 330-337. ACM, New York (2006)
-
(2006)
SAC 2006: Proceedings of the 2006 ACM Symposium on Applied Computing
, pp. 330-337
-
-
Kirda, E.1
Kruegel, C.2
Vigna, G.3
Jovanovic, N.4
-
11
-
-
80955158755
-
-
Kouns, J., Todd, K., Martin, B., Shettler, D., Tornio, S., Ingram, C., McDonald, P.: The open source vulnerability database (2010), http://osvdb.org/
-
(2010)
The Open Source Vulnerability Database
-
-
Kouns, J.1
Todd, K.2
Martin, B.3
Shettler, D.4
Tornio, S.5
Ingram, C.6
McDonald, P.7
-
12
-
-
34547229642
-
Have things changed now?: An empirical study of bug characteristics in modern open source software
-
ACM, New York
-
Li, Z., Tan, L., Wang, X., Lu, S., Zhou, Y., Zhai, C.: Have things changed now?: an empirical study of bug characteristics in modern open source software. In: ASID 2006: Proceedings of the 1st Workshop on Architectural and System Support for Improving Software Dependability, pp. 25-33. ACM, New York (2006)
-
(2006)
ASID 2006: Proceedings of the 1st Workshop on Architectural and System Support for Improving Software Dependability
, pp. 25-33
-
-
Li, Z.1
Tan, L.2
Wang, X.3
Lu, S.4
Zhou, Y.5
Zhai, C.6
-
15
-
-
84857096687
-
-
Martin, B., Brown, M., Paller, A., Kirby, D.: 2010 cwe/sans top 25 most dangerous software errors (2010), http://cwe.mitre.org/top25/
-
(2010)
2010 Cwe/sans Top 25 Most Dangerous Software Errors
-
-
Martin, B.1
Brown, M.2
Paller, A.3
Kirby, D.4
-
21
-
-
84857100253
-
-
MITRE. Mitre faqs (2010), http://cve.mitre.org/about/faqs.html
-
(2010)
Mitre Faqs
-
-
-
23
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signaturegeneration of exploits on commodity software
-
The Internet Society
-
Newsome, J., Song, D.X.: Dynamic taint analysis for automatic detection, analysis, and signaturegeneration of exploits on commodity software. In: NDSS. The Internet Society (2005)
-
(2005)
NDSS
-
-
Newsome, J.1
Song, D.X.2
-
24
-
-
84871349041
-
Automatically hardening web applications using precise tainting
-
Springer, Heidelberg
-
Nguyen-Tuong, A., Guarnieri, S., Greene, D., Shirley, J., Evans, D.: Automatically hardening web applications using precise tainting. In: SEC 2005, pp. 295-308. Springer, Heidelberg (2005)
-
(2005)
SEC 2005
, pp. 295-308
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Shirley, J.4
Evans, D.5
-
25
-
-
59449108823
-
-
Computer Security Division of National Institute of Standards and Technology. version 2.2
-
Computer Security Division of National Institute of Standards and Technology. National vulnerability database version 2.2 (2010), http://nvd.nist.gov/
-
(2010)
National Vulnerability Database
-
-
-
27
-
-
33745661661
-
Defending against injection attacks through context-sensitive string evaluation
-
DOI 10.1007/11663812-7, Recent Advances in Intrusion Detection - 8th International Symposium, RAID 2005, Revised Papers
-
Pietraszek, T., Berghe, C.V.: Defending Against Injection Attacks Through Context-Sensitive String Evaluation. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, pp. 124-145. Springer, Heidelberg (2006) (Pubitemid 43973725)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3858 LNCS
, pp. 124-145
-
-
Pietraszek, T.1
Berghe, C.V.2
-
31
-
-
74049104017
-
Ripley: Automatically securing web 2.0 applications through replicated execution
-
ACM, New York
-
Vikram, K., Prateek, A., Livshits, B.: Ripley: automatically securing web 2.0 applications through replicated execution. In: CCS 2009: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 173-186. ACM, New York (2009)
-
(2009)
CCS 2009: Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 173-186
-
-
Vikram, K.1
Prateek, A.2
Livshits, B.3
-
32
-
-
84887309913
-
Cross site scripting prevention with dynamic data tainting and static analysis
-
Vogt, P., Nentwich, F., Jovanovic, N., Kruegel, C., Kirda, E., Vigna, G.: Cross site scripting prevention with dynamic data tainting and static analysis. In: In Proceedings of 14th Annual Network and Distributed System Security Symposium, NDSS 2007 (2007)
-
(2007)
Proceedings of 14th Annual Network and Distributed System Security Symposium, NDSS 2007
-
-
Vogt, P.1
Nentwich, F.2
Jovanovic, N.3
Kruegel, C.4
Kirda, E.5
Vigna, G.6
-
34
-
-
57349153984
-
Static Detection of Cross-Site Scripting Vulnerabilities
-
ACM, New York (in press)
-
Wassermann, G., Su, Z.: Static Detection of Cross-Site Scripting Vulnerabilities. In: Proceedings of the 30th International Conference on Software Engineering, Leipzig, Germany. ACM, New York (2008) (in press)
-
(2008)
Proceedings of the 30th International Conference on Software Engineering, Leipzig, Germany
-
-
Wassermann, G.1
Su, Z.2
-
36
-
-
57349151451
-
Better abstractions for secure serverside scripting
-
ACM, New York
-
Yu, D., Chander, A., Inamura, H., Serikov, I.: Better abstractions for secure serverside scripting. In: WWW 2008: Proceeding of the 17th International Conference on World Wide Web, pp. 507-516. ACM, New York (2008)
-
(2008)
WWW 2008: Proceeding of the 17th International Conference on World Wide Web
, pp. 507-516
-
-
Yu, D.1
Chander, A.2
Inamura, H.3
Serikov, I.4
|