메뉴 건너뛰기




Volumn , Issue , 2011, Pages

SAFERPHP: Finding semantic vulnerabilities in PHP applications

Author keywords

Access control; Data flow analysis; Denial of service; PHP; Security checks; Static analysis

Indexed keywords

CROSS SITE SCRIPTING; DENIAL OF SERVICE; INTER-PROCEDURAL ALGORITHMS; PHP; SECURITY CHECKS; SOURCE CODES; SQL INJECTION; STATIC SECURITY ANALYSIS; WEB APPLICATION;

EID: 84860306633     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2166956.2166964     Document Type: Conference Paper
Times cited : (53)

References (33)
  • 2
    • 49949096891 scopus 로고    scopus 로고
    • Multi-module vulnerability analysis of web-based applications
    • D. Balzarotti, M. Cova, V. Felmetsger, and G. Vigna. Multi-module vulnerability analysis of Web-based applications. In CCS, 2007.
    • (2007) CCS
    • Balzarotti, D.1    Cova, M.2    Felmetsger, V.3    Vigna, G.4
  • 3
    • 70349266257 scopus 로고    scopus 로고
    • Robust defenses for cross-site request forgery
    • A. Barth, C. Jackson, and J. Mitchell. Robust defenses for cross-site request forgery. In CCS, 2008.
    • (2008) CCS
    • Barth, A.1    Jackson, C.2    Mitchell, J.3
  • 4
    • 77954941443 scopus 로고    scopus 로고
    • Efficient, context-sensitive detection of real-world semantic attacks
    • M. Bond, V. Srivastava, K. McKinley, and V. Shmatikov. Efficient, context-sensitive detection of real-world semantic attacks. In PLAS, 2010.
    • (2010) PLAS
    • Bond, M.1    Srivastava, V.2    McKinley, K.3    Shmatikov, V.4
  • 5
    • 59949104590 scopus 로고    scopus 로고
    • Termination of polynomial programs
    • A. Bradley, Z. Manna, and H. Sipma. Termination of polynomial programs. In VMCAI, 2005.
    • (2005) VMCAI
    • Bradley, A.1    Manna, Z.2    Sipma, H.3
  • 6
    • 77952209743 scopus 로고    scopus 로고
    • Looper: Lightweight detection of infinite loops at runtime
    • J. Burnim, N. Jalbert, C. Stergiou, and K. Sen. Looper: Lightweight detection of infinite loops at runtime. In ASE, 2009.
    • (2009) ASE
    • Burnim, J.1    Jalbert, N.2    Stergiou, C.3    Sen, K.4
  • 9
    • 33746086704 scopus 로고    scopus 로고
    • Termination proofs for systems code
    • B. Cook, A. Podelski, and A. Rybalchenko. Termination proofs for systems code. SIGPLAN Not., 41(6):415-426, 2006.
    • (2006) SIGPLAN Not. , vol.41 , Issue.6 , pp. 415-426
    • Cook, B.1    Podelski, A.2    Rybalchenko, A.3
  • 10
    • 85010849899 scopus 로고    scopus 로고
    • Denial of service via algorithmic complexity attacks
    • S. Crosby and D. Wallach. Denial of service via algorithmic complexity attacks. In USENIX Security, 2003.
    • (2003) USENIX Security
    • Crosby, S.1    Wallach, D.2
  • 11
    • 84860269157 scopus 로고    scopus 로고
    • CVE-2007-2872. http://www.securityfocus.com/archive/1/archive/1/470244/ 100/0/threaded.
    • CVE-2007-2872
  • 12
    • 84860274914 scopus 로고    scopus 로고
    • CVE-2009-4418. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009- 4418.
    • CVE-2009-4418
  • 14
    • 0037673305 scopus 로고    scopus 로고
    • Runtime verification of authorization hook placement for the linux security modules framework
    • A. Edwards, T. Jaeger, and X. Zhang. Runtime verification of authorization hook placement for the Linux Security Modules framework. In CCS, 2002.
    • (2002) CCS
    • Edwards, A.1    Jaeger, T.2    Zhang, X.3
  • 15
    • 84894088425 scopus 로고    scopus 로고
    • Toward automated detection of logic vulnerabilities in web applications
    • V. Felmetsger, L. Cavedon, C. Kruegel, and G. Vigna. Toward automated detection of logic vulnerabilities in Web applications. In USENIX Security, 2010.
    • (2010) USENIX Security
    • Felmetsger, V.1    Cavedon, L.2    Kruegel, C.3    Vigna, G.4
  • 16
    • 0031245885 scopus 로고    scopus 로고
    • Call graph construction in object-oriented languages
    • D. Grove, G. DeFouw, J. Dean, and C. Chambers. Call graph construction in object-oriented languages. SIGPLAN Not., 32(10):108-124, 1997.
    • (1997) SIGPLAN Not. , vol.32 , Issue.10 , pp. 108-124
    • Grove, D.1    DeFouw, G.2    Dean, J.3    Chambers, C.4
  • 18
    • 19944365247 scopus 로고    scopus 로고
    • Securing web application code by static analysis and runtime protection
    • Y. Huang, F. Yu, C. Hang, C. Tsai, D. Lee, and S. Kuo. Securing Web application code by static analysis and runtime protection. In WWW, 2004.
    • (2004) WWW
    • Huang, Y.1    Yu, F.2    Hang, C.3    Tsai, C.4    Lee, D.5    Kuo, S.6
  • 19
    • 78649992349 scopus 로고    scopus 로고
    • Pixy: A static analysis tool for detecting web application vulnerabilities
    • N. Jovanovic, C. Kruegel, and E. Kirda. Pixy: A static analysis tool for detecting web application vulnerabilities. In S&P, 2006.
    • (2006) S&P
    • Jovanovic, N.1    Kruegel, C.2    Kirda, E.3
  • 20
    • 33745934031 scopus 로고    scopus 로고
    • Precise alias analysis for static detection of web application vulnerabilities
    • N. Jovanovic, C. Kruegel, and E. Kirda. Precise alias analysis for static detection of web application vulnerabilities. In PLAS, 2006.
    • (2006) PLAS
    • Jovanovic, N.1    Kruegel, C.2    Kirda, E.3
  • 21
    • 1242350162 scopus 로고    scopus 로고
    • M. Kenney. Ping of death. http://insecure.org/sploits/ping-o-death.html, 1997.
    • (1997) Ping of Death
    • Kenney, M.1
  • 24
    • 70450245243 scopus 로고    scopus 로고
    • Merlin: Specification inference for explicit information flow problems
    • B. Livshits, A. Nori, S. Rajamani, and A. Banerjee. Merlin: specification inference for explicit information flow problems. In PLDI, 2009.
    • (2009) PLDI
    • Livshits, B.1    Nori, A.2    Rajamani, S.3    Banerjee, A.4
  • 26
    • 84860276293 scopus 로고    scopus 로고
    • PHC. http://phpcompiler.org, 2009.
    • (2009) PHC
  • 27
    • 84860275188 scopus 로고    scopus 로고
    • CVE-2005-1807. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005- 1807, 2005.
    • (2005) CVE-2005-1807
  • 28
    • 33745965014 scopus 로고    scopus 로고
    • Interprocedu-ral analysis for privileged code placement and tainted variable detection
    • M. Pistoia, R. Flynn, L. Koved, and V. Sreedhar. Interprocedu-ral analysis for privileged code placement and tainted variable detection. In ECOOP, 2005.
    • (2005) ECOOP
    • Pistoia, M.1    Flynn, R.2    Koved, L.3    Sreedhar, V.4
  • 30
    • 84894034704 scopus 로고    scopus 로고
    • AutoISES: Automatically inferring security specifications and detecting violations
    • L. Tan, X. Zhang, X. Ma, W. Xiong, and Y. Zhou. AutoISES: automatically inferring security specifications and detecting violations. In USENIX Security, 2008.
    • (2008) USENIX Security
    • Tan, L.1    Zhang, X.2    Ma, X.3    Xiong, W.4    Zhou, Y.5
  • 31
    • 35449004893 scopus 로고    scopus 로고
    • Sound and precise analysis of web applications for injection vulnerabilities
    • G. Wasserman and Z. Su. Sound and precise analysis of web applications for injection vulnerabilities. In PLDI, 2007.
    • (2007) PLDI
    • Wasserman, G.1    Su, Z.2
  • 33
    • 84910681237 scopus 로고    scopus 로고
    • Static detection of security vulnerabilities in scripting languages
    • Y. Xie and A. Aiken. Static detection of security vulnerabilities in scripting languages. In USENIX Security, 2006.
    • (2006) USENIX Security
    • Xie, Y.1    Aiken, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.