메뉴 건너뛰기




Volumn , Issue , 2011, Pages 11-20

An empirical study of the evolution of PHP web application security

Author keywords

code complexity; security metrics; software security; static analysis

Indexed keywords

NETWORK SECURITY; OPEN SOURCE SOFTWARE; OPEN SYSTEMS;

EID: 84859046238     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/Metrisec.2011.18     Document Type: Conference Paper
Times cited : (19)

References (25)
  • 2
    • 84859017218 scopus 로고    scopus 로고
    • accessed June 4, 2011
    • BuildBot, http://trac.buildbot.net/wiki/SuccessStories, accessed June 4, 2011.
  • 3
    • 79952574726 scopus 로고    scopus 로고
    • Using complexity, coupling, and cohesion metrics as early indicators of vulnerabilities
    • March 2011
    • I.Chowdhury and M.Zulkernine. 2011. Using complexity, coupling, and cohesion metrics as early indicators of vulnerabilities. J. Syst. Archit. 57, 3 (March 2011), 294-313.
    • (2011) J. Syst. Archit. , vol.57 , Issue.3 , pp. 294-313
    • Chowdhury, I.1    Zulkernine, M.2
  • 5
    • 84859013698 scopus 로고    scopus 로고
    • published May 22, 2007
    • S.M. Christey and R. A. Martin, http://www.cve.mitre.org/docs/vuln- trends/index.html, published May 22, 2007.
    • Christey, S.M.1    Martin, R.A.2
  • 6
    • 84859030733 scopus 로고    scopus 로고
    • accessed June 4, 2011
    • http://pear.php.net/package/PHP CodeSniffer/ accessed June 4, 2011.
  • 8
    • 84859023993 scopus 로고    scopus 로고
    • accessed June 4, 2011
    • http://cve.mitre.org/cve/editorial policies/cd abstraction.html, accessed June 4, 2011.
  • 9
    • 69949156316 scopus 로고    scopus 로고
    • July
    • Fortify Security Research Group and Larry Suto, "Open Source Security Study," http://www.fortify.com/landing/oss/oss report.jsp, July 2008.
    • (2008) Open Source Security Study
  • 10
    • 35348918737 scopus 로고    scopus 로고
    • Toward the Use of Automated Static Analysis Alerts for Early Identification of Vulnerability- And Attack-prone Components
    • IEEE Computer Society, Washington, DC, USA
    • M. Gegick and L. Williams. 2007. "Toward the Use of Automated Static Analysis Alerts for Early Identification of Vulnerability- and Attack-prone Components." In Proceedings of the Second International Conference on Internet Monitoring and Protection (ICIMP '07). IEEE Computer Society, Washington, DC, USA.
    • (2007) Proceedings of the Second International Conference on Internet Monitoring and Protection (ICIMP '07)
    • Gegick, M.1    Williams, L.2
  • 14
    • 84859013407 scopus 로고    scopus 로고
    • LizaMoon Mass SQL Injection Attack Points to Rogue AV Site
    • March 29
    • F.Rashid, "LizaMoon Mass SQL Injection Attack Points to Rogue AV Site," eWeek, http://www.eweek.com/c/a/Security/LizaMoon-Mass-SQL- Injection-Attack-Points-to-Rogue-AV-Site-852537/, March 29, 2011.
    • (2011) eWeek
    • Rashid, F.1
  • 15
    • 0017291489 scopus 로고
    • A Complexity Measure
    • IEEE Press, New York
    • T.J. McCabe, "A Complexity Measure", IEEE Transactions on Software Engineering, 2(4), IEEE Press, New York, 1976, pp. 308-320.
    • (1976) IEEE Transactions on Software Engineering , vol.2 , Issue.4 , pp. 308-320
    • McCabe, T.J.1
  • 19
    • 84859013691 scopus 로고    scopus 로고
    • accessed June 4, 2011
    • NVD, http://nvd.nist.gov/, accessed June 4, 2011.
  • 20
    • 84859055602 scopus 로고    scopus 로고
    • accessed June 4, 2011
    • OWASP, https://www.owasp.org/index.php/Top 10 2010-Main, accessed June 4, 2011.
  • 21
    • 77953734916 scopus 로고    scopus 로고
    • Replicating MSR: A Study of the Potential Replicability of Papers Published in the Mining Software Repositories Proceedings
    • G. Robles. "Replicating MSR: A Study of the Potential Replicability of Papers Published in the Mining Software Repositories Proceedings." In Proceedings of the Working Conference on Mining Software Repositories, 2010.
    • Proceedings of the Working Conference on Mining Software Repositories, 2010
    • Robles, G.1
  • 22
    • 83555172467 scopus 로고    scopus 로고
    • Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities
    • to appear
    • Y.Shin, A.Meneely, L.Williams, J.Osbourne, Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities, IEEE Transactions in Software Engineering, to appear, 2011.
    • (2011) IEEE Transactions in Software Engineering
    • Shin, Y.1    Meneely, A.2    Williams, L.3    Osbourne, J.4
  • 24
    • 84859013692 scopus 로고    scopus 로고
    • accessed June 4, 2011
    • Web Application Security Consortium, Web Application Hacking Incident Database, http://projects.webappsec.org/w/page/13246995/Web-Hacking-Incident- Database, accessed June 4, 2011.
    • Web Application Hacking Incident Database
  • 25
    • 84859013693 scopus 로고    scopus 로고
    • accessed June 4, 2011
    • D.A. Wheeler, http://www.dwheeler.com/sloccount/ accessed June 4, 2011.
    • Wheeler, D.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.