-
2
-
-
49949096891
-
Multi-module vulnerability analysis of web-based applications
-
D. Balzarotti, M. Cova, V. Felmetsger, and G. Vigna. Multi-module vulnerability analysis of Web-based applications. In CCS, 2007.
-
(2007)
CCS
-
-
Balzarotti, D.1
Cova, M.2
Felmetsger, V.3
Vigna, G.4
-
3
-
-
70349266257
-
Robust defenses for cross-site request forgery
-
A. Barth, C. Jackson, and J. Mitchell. Robust defenses for cross-site request forgery. In CCS, 2008.
-
(2008)
CCS
-
-
Barth, A.1
Jackson, C.2
Mitchell, J.3
-
4
-
-
77954941443
-
Efficient, context-sensitive detection of real-world semantic attacks
-
M. Bond, V. Srivastava, K. McKinley, and V. Shmatikov. Efficient, context-sensitive detection of real-world semantic attacks. In PLAS, 2010.
-
(2010)
PLAS
-
-
Bond, M.1
Srivastava, V.2
McKinley, K.3
Shmatikov, V.4
-
6
-
-
77952209743
-
Looper: Lightweight detection of infinite loops at runtime
-
J. Burnim, N. Jalbert, C. Stergiou, and K. Sen. Looper: Lightweight detection of infinite loops at runtime. In ASE, 2009.
-
(2009)
ASE
-
-
Burnim, J.1
Jalbert, N.2
Stergiou, C.3
Sen, K.4
-
7
-
-
34547241782
-
EXE: Automatically generating inputs of death
-
C. Cadar, V. Ganesh, P. Pawlowski, D. Dill, and D. Engler. EXE: Automatically generating inputs of death. In CCS, 2006.
-
(2006)
CCS
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P.3
Dill, D.4
Engler, D.5
-
8
-
-
70350525202
-
Inputs of coma: Static detection of denial-of-serice vulnerabilities
-
R. Chang, G. Jiang, F. Ivanĉić, S. Sankaranarayanan, and V. Shmatikov. Inputs of coma: Static detection of denial-of-serice vulnerabilities. In CSF, 2009.
-
(2009)
CSF
-
-
Chang, R.1
Jiang, G.2
Ivanĉić, F.3
Sankaranarayanan, S.4
Shmatikov, V.5
-
9
-
-
33746086704
-
Termination proofs for systems code
-
B. Cook, A. Podelski, and A. Rybalchenko. Termination proofs for systems code. SIGPLAN Not., 41(6):415-426, 2006.
-
(2006)
SIGPLAN Not.
, vol.41
, Issue.6
, pp. 415-426
-
-
Cook, B.1
Podelski, A.2
Rybalchenko, A.3
-
10
-
-
85010849899
-
Denial of service via algorithmic complexity attacks
-
S. Crosby and D. Wallach. Denial of service via algorithmic complexity attacks. In USENIX Security, 2003.
-
(2003)
USENIX Security
-
-
Crosby, S.1
Wallach, D.2
-
11
-
-
84860269157
-
-
CVE-2007-2872. http://www.securityfocus.com/archive/1/archive/1/470244/ 100/0/threaded.
-
CVE-2007-2872
-
-
-
12
-
-
84860274914
-
-
CVE-2009-4418. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009- 4418.
-
CVE-2009-4418
-
-
-
13
-
-
0002940467
-
Using types to analyze and optimize object-oriented programs
-
DOI 10.1145/383721.383732
-
A. Diwan, K. McKinley, and J. Moss. Using types to analyze and optimize object-oriented programs. ACM Trans. Program. Lang. Syst., 23(1):30-72, 2001. (Pubitemid 33614269)
-
(2001)
ACM Transactions on Programming Languages and Systems
, vol.23
, Issue.1
, pp. 30-72
-
-
Diwan, A.1
McKinley, K.S.2
Moss, J.E.B.3
-
14
-
-
0037673305
-
Runtime verification of authorization hook placement for the linux security modules framework
-
A. Edwards, T. Jaeger, and X. Zhang. Runtime verification of authorization hook placement for the Linux Security Modules framework. In CCS, 2002.
-
(2002)
CCS
-
-
Edwards, A.1
Jaeger, T.2
Zhang, X.3
-
16
-
-
0031245885
-
Call graph construction in object-oriented languages
-
D. Grove, G. DeFouw, J. Dean, and C. Chambers. Call graph construction in object-oriented languages. SIGPLAN Not., 32(10):108-124, 1997.
-
(1997)
SIGPLAN Not.
, vol.32
, Issue.10
, pp. 108-124
-
-
Grove, D.1
DeFouw, G.2
Dean, J.3
Chambers, C.4
-
17
-
-
84865648489
-
Provig non-termination
-
A. Gupta, T. Henzinger, R. Majumdar, A. Rybalchenko, and R. Xu. Provig non-termination. In POPL, 2008.
-
(2008)
POPL
-
-
Gupta, A.1
Henzinger, T.2
Majumdar, R.3
Rybalchenko, A.4
Xu, R.5
-
18
-
-
19944365247
-
Securing web application code by static analysis and runtime protection
-
Y. Huang, F. Yu, C. Hang, C. Tsai, D. Lee, and S. Kuo. Securing Web application code by static analysis and runtime protection. In WWW, 2004.
-
(2004)
WWW
-
-
Huang, Y.1
Yu, F.2
Hang, C.3
Tsai, C.4
Lee, D.5
Kuo, S.6
-
19
-
-
78649992349
-
Pixy: A static analysis tool for detecting web application vulnerabilities
-
N. Jovanovic, C. Kruegel, and E. Kirda. Pixy: A static analysis tool for detecting web application vulnerabilities. In S&P, 2006.
-
(2006)
S&P
-
-
Jovanovic, N.1
Kruegel, C.2
Kirda, E.3
-
20
-
-
33745934031
-
Precise alias analysis for static detection of web application vulnerabilities
-
N. Jovanovic, C. Kruegel, and E. Kirda. Precise alias analysis for static detection of web application vulnerabilities. In PLAS, 2006.
-
(2006)
PLAS
-
-
Jovanovic, N.1
Kruegel, C.2
Kirda, E.3
-
21
-
-
1242350162
-
-
M. Kenney. Ping of death. http://insecure.org/sploits/ping-o-death.html, 1997.
-
(1997)
Ping of Death
-
-
Kenney, M.1
-
24
-
-
70450245243
-
Merlin: Specification inference for explicit information flow problems
-
B. Livshits, A. Nori, S. Rajamani, and A. Banerjee. Merlin: specification inference for explicit information flow problems. In PLDI, 2009.
-
(2009)
PLDI
-
-
Livshits, B.1
Nori, A.2
Rajamani, S.3
Banerjee, A.4
-
26
-
-
84860276293
-
-
PHC. http://phpcompiler.org, 2009.
-
(2009)
PHC
-
-
-
27
-
-
84860275188
-
-
CVE-2005-1807. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005- 1807, 2005.
-
(2005)
CVE-2005-1807
-
-
-
28
-
-
33745965014
-
Interprocedu-ral analysis for privileged code placement and tainted variable detection
-
M. Pistoia, R. Flynn, L. Koved, and V. Sreedhar. Interprocedu-ral analysis for privileged code placement and tainted variable detection. In ECOOP, 2005.
-
(2005)
ECOOP
-
-
Pistoia, M.1
Flynn, R.2
Koved, L.3
Sreedhar, V.4
-
30
-
-
84894034704
-
AutoISES: Automatically inferring security specifications and detecting violations
-
L. Tan, X. Zhang, X. Ma, W. Xiong, and Y. Zhou. AutoISES: automatically inferring security specifications and detecting violations. In USENIX Security, 2008.
-
(2008)
USENIX Security
-
-
Tan, L.1
Zhang, X.2
Ma, X.3
Xiong, W.4
Zhou, Y.5
-
31
-
-
35449004893
-
Sound and precise analysis of web applications for injection vulnerabilities
-
G. Wasserman and Z. Su. Sound and precise analysis of web applications for injection vulnerabilities. In PLDI, 2007.
-
(2007)
PLDI
-
-
Wasserman, G.1
Su, Z.2
-
33
-
-
84910681237
-
Static detection of security vulnerabilities in scripting languages
-
Y. Xie and A. Aiken. Static detection of security vulnerabilities in scripting languages. In USENIX Security, 2006.
-
(2006)
USENIX Security
-
-
Xie, Y.1
Aiken, A.2
|