-
2
-
-
49949109144
-
Candid: Preventing SQL injection attacks using dynamic candidate evaluations
-
S. Bandhakavi, P. Bisht, P. Madhusudan, and V. N. Venkatakrishnan. Candid: preventing SQL injection attacks using dynamic candidate evaluations. In Proceedings of the ACM Conference on Computer and Communications Security, pages 12-24, 2007.
-
(2007)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 12-24
-
-
Bandhakavi, S.1
Bisht, P.2
Madhusudan, P.3
Venkatakrishnan, V.N.4
-
3
-
-
77949464016
-
CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks
-
Feb
-
P. Bisht, P. Madhusudan, and V. N. Venkatakrishnan. CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks. ACM Trans. Inf. Syst. Secur., 13(2):1-39, Feb. 2010.
-
(2010)
ACM Trans. Inf. Syst. Secur.
, vol.13
, Issue.2
, pp. 1-39
-
-
Bisht, P.1
Madhusudan, P.2
Venkatakrishnan, V.N.3
-
4
-
-
77950862952
-
Preventing injection attacks with syntax embeddings
-
July
-
M. Bravenboer, E. Dolstra, and E. Visser. Preventing injection attacks with syntax embeddings. Science of Computer Programming, 75(7): 473-495, July 2010.
-
(2010)
Science of Computer Programming
, vol.75
, Issue.7
, pp. 473-495
-
-
Bravenboer, M.1
Dolstra, E.2
Visser, E.3
-
6
-
-
34548212308
-
Dytan: A generic dynamic taint analysis framework
-
DOI 10.1145/1273463.1273490, Proceedings of the 2007 ACM International Symposium on Software Testing and Analysis, ISSTA'07
-
J. Clause,W. Li, and A. Orso. Dytan: a generic dynamic taint analysis framework. In Proceedings of the ACM International Symposium on Software Testing and Analysis, pages 196-206, 2007. (Pubitemid 47317593)
-
(2007)
2007 ACM International Symposium on Software Testing and Analysis, ISSTA'07
, pp. 196-206
-
-
Clause, J.1
Li, W.2
Orso, A.3
-
7
-
-
1442288707
-
Ccured in the real world
-
May
-
J. Condit, M. Harren, S. McPeak, G. C. Necula, and W. Weimer. Ccured in the real world. SIGPLAN Notices, 38:232-244, May 2003.
-
(2003)
SIGPLAN Notices
, vol.38
, pp. 232-244
-
-
Condit, J.1
Harren, M.2
McPeak, S.3
Necula, G.C.4
Weimer, W.5
-
8
-
-
40449091840
-
WASP: Protecting web applications using positive tainting and syntax-aware evaluation
-
DOI 10.1109/TSE.2007.70748
-
W. Halfond, A. Orso, and P. Manolios. Wasp: Protecting web applications using positive tainting and syntax-aware evaluation. IEEE Trans. Softw. Eng., 34(1):65-81, 2008. (Pubitemid 351343903)
-
(2008)
IEEE Transactions on Software Engineering
, vol.34
, Issue.1
, pp. 65-81
-
-
Halfond, W.G.J.1
Orso, A.2
Manolios, P.3
-
11
-
-
85084164164
-
Cyclone: A safe dialect of c
-
Berkeley, CA, USA. USENIX Association
-
T. Jim, J. G. Morrisett, D. Grossman, M. W. Hicks, J. Cheney, and Y. Wang. Cyclone: A safe dialect of c. In Proceedings of the General Track of the USENIX Annual Technical Conference, pages 275-288, Berkeley, CA, USA, 2002. USENIX Association.
-
(2002)
Proceedings of the General Track of the USENIX Annual Technical Conference
, pp. 275-288
-
-
Jim, T.1
Morrisett, J.G.2
Grossman, D.3
Hicks, M.W.4
Cheney, J.5
Wang, Y.6
-
12
-
-
33751027156
-
Pixy: A static analysis tool for detecting web application vulnerabilities (Short paper)
-
DOI 10.1109/SP.2006.29, 1624016, Proceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006
-
N. Jovanovic, C. Kruegel, and E. Kirda. Pixy: A static analysis tool for detecting web application vulnerabilities (short paper). In Proceedings of the IEEE Symposium on Security and Privacy, pages 258-263, 2006. (Pubitemid 44753727)
-
(2006)
Proceedings - IEEE Symposium on Security and Privacy
, vol.2006
, pp. 258-263
-
-
Jovanovic, N.1
Kruegel, C.2
Kirda, E.3
-
15
-
-
0001621268
-
On the translation of languages from left to right
-
D. E. Knuth. On the translation of languages from left to right. Information and Control, 8(6):607-639, 1965.
-
(1965)
Information and Control
, vol.8
, Issue.6
, pp. 607-639
-
-
Knuth, D.E.1
-
16
-
-
0001097061
-
The mechanical evaluation of expressions
-
P. J. Landin. The mechanical evaluation of expressions. Computer Journal, 6(4):308-320, 1963.
-
(1963)
Computer Journal
, vol.6
, Issue.4
, pp. 308-320
-
-
Landin, P.J.1
-
18
-
-
84857181499
-
-
Microsoft. SQL Minimum Grammar, 2011. http://msdn.microsoft.com/en-us/ library/ms711725(VS.85).aspx.
-
(2011)
SQL Minimum Grammar
-
-
-
19
-
-
84857166285
-
-
Microsoft. CREATE FUNCTION (Transact-SQL), 2011. http://msdn.microsoft. com/en-us/library/ms186755.aspx.
-
(2011)
CREATE FUNCTION (Transact-SQL)
-
-
-
20
-
-
84857170440
-
-
The MITRE Corporation. Document version 1.4
-
CWE/SANS Top 25 Most Dangerous Software Errors. The MITRE Corporation, 2009. Document version 1.4, http://cwe.mitre.org/top25/archive/2009/2009-cwe- sans-top-25.pdf.
-
(2009)
CWE/SANS Top 25 Most Dangerous Software Errors
-
-
-
21
-
-
84864234149
-
-
The MITRE Corporation. Document version 1.08
-
CWE/SANS Top 25 Most Dangerous Software Errors. The MITRE Corporation, 2010. Document version 1.08, http://cwe.mitre.org/top25/archive/2010/2010-cwe- sans-top25.pdf.
-
(2010)
CWE/SANS Top 25 Most Dangerous Software Errors
-
-
-
22
-
-
84857169522
-
-
The MITRE Corporation. Document version 1.0.2
-
CWE/SANS Top 25 Most Dangerous Software Errors. The MITRE Corporation, 2011. Document version 1.0.2, http://cwe.mitre.org/top25/archive/2011/2011-cwe- sans-top25.pdf.
-
(2011)
CWE/SANS Top 25 Most Dangerous Software Errors
-
-
-
23
-
-
33646032658
-
CCured: Type-safe retrofitting of legacy software
-
DOI 10.1145/1065887.1065892
-
G. C. Necula, J. Condit, M. Harren, S. McPeak, and W. Weimer. Ccured: type-safe retrofitting of legacy software. ACM Trans. Program. Lang. Syst., 27:477-526, May 2005. (Pubitemid 43942510)
-
(2005)
ACM Transactions on Programming Languages and Systems
, vol.27
, Issue.3
, pp. 477-526
-
-
Necula, G.C.1
Condit, J.2
Harren, M.3
McPeak, S.4
Weimer, W.5
-
24
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
Feb
-
J. Newsome and D. X. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proceedings of the Network and Distributed System Security Symposium, Feb. 2005.
-
(2005)
Proceedings of the Network and Distributed System Security Symposium
-
-
Newsome, J.1
Song, D.X.2
-
25
-
-
84871349041
-
Automatically hardening web applications using precise tainting
-
A. Nguyen-tuong, S. Guarnieri, D. Greene, J. Shirley, and D. Evans. Automatically hardening web applications using precise tainting. In Proceedings of the IFIP International Information Security Conference, pages 372-382, 2005.
-
(2005)
Proceedings of the IFIP International Information Security Conference
, pp. 372-382
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Shirley, J.4
Evans, D.5
-
27
-
-
84857173560
-
-
An Oracle White Paper, December. Page 11
-
Oracle. How to write injection-proof PL/SQL. An Oracle White Paper, December 2008. URL http://www.oracle.com/technetwork/database/features/plsql/ overview/how-to-write-injection-proof-plsql-1-129572.pdf. Page 11.
-
(2008)
How to Write Injection-proof PL/SQL
-
-
-
29
-
-
84857160572
-
-
Oracle. CREATE FUNCTION, 2011. http://download.oracle.com/docs/cd/E11882- 01/server.112/e17118/statements-5011.htm.
-
(2011)
Create Function
-
-
-
32
-
-
18944377121
-
Call-by-name call-by-value and the λ-calculus
-
G. D. Plotkin. Call-by-name, call-by-value and the λ-calculus. Theoretical Computer Science, 1(2):125-159, 1975.
-
(1975)
Theoretical Computer Science
, vol.1
, Issue.2
, pp. 125-159
-
-
Plotkin, G.D.1
-
33
-
-
77955182005
-
All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask
-
May
-
E. J. Schwartz, T. Avgerinos, and D. Brumley. All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask). In Proceedings of the IEEE Symposium on Security and Privacy, May 2010.
-
(2010)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Schwartz, E.J.1
Avgerinos, T.2
Brumley, D.3
-
35
-
-
70450242742
-
TAJ: Effective taint analysis of web applications
-
O. Tripp, M. Pistoia, S. J. Fink, M. Sridharan, and O. Weisman. TAJ: effective taint analysis of web applications. In Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, pages 87-97, 2009.
-
(2009)
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation
, pp. 87-97
-
-
Tripp, O.1
Pistoia, M.2
Fink, S.J.3
Sridharan, M.4
Weisman, O.5
-
36
-
-
84857851939
-
The art of war
-
Translated by Lionel Giles
-
S. Tzu. The art of war. The Project Gutenberg eBook. Translated by Lionel Giles. http://www.gutenberg.org/cache/epub/17405/pg17405.txt.
-
The Project Gutenberg EBook
-
-
Tzu, S.1
-
39
-
-
74049160328
-
Filter-resistant code injection on ARM
-
Y. Younan, P. Philippaerts, F. Piessens, W. Joosen, S. Lachmund, and T. Walter. Filter-resistant code injection on ARM. In Proceedings of the ACM Conference on Computer and Communications Security, pages 11-20, 2009.
-
(2009)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 11-20
-
-
Younan, Y.1
Philippaerts, P.2
Piessens, F.3
Joosen, W.4
Lachmund, S.5
Walter, T.6
|