-
1
-
-
84861092051
-
-
ab - Apache HTTP server benchmarking tool [accessed 20.03.11]
-
ab - Apache HTTP server benchmarking tool. http://httpd.apache.org/docs/ 2.2/programs/ab.html; 2010. [accessed 20.03.11].
-
(2010)
-
-
-
3
-
-
18744376889
-
Randomized instruction set emulation to disrupt binary code injection attacks
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
E.G. Barrantes, D.H. Ackley, S. Forrest, T.S. Palmer, D. Stefanović, and D.D. Zovi Randomized instruction set emulation to disrupt binary code injection attacks Proceedings of the 10th ACM conference on computer and communications security (CCS 2003) 2003 ACM Washington D.C., USA 281 289 (Pubitemid 40673810)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 281-289
-
-
Barrantes, E.G.1
Palmer, T.S.2
Ackley, D.H.3
Stefanovic, D.4
Forrest, S.5
Zovi, D.D.6
-
9
-
-
85062418620
-
Non-control-data attacks are realistic Threats
-
USENIX Association Baltimore, MD, USA
-
S. Chen, J. Xu, E.C. Sezer, P. Gauriar, and R.K. Iyer Non-control-data attacks are realistic Threats USENIX security symposium. USENIX the advanced computing systems association 2005 USENIX Association Baltimore, MD, USA 177 192
-
(2005)
USENIX Security Symposium. USENIX the Advanced Computing Systems Association
, pp. 177-192
-
-
Chen, S.1
Xu, J.2
Sezer, E.C.3
Gauriar, P.4
Iyer, R.K.5
-
10
-
-
84861101894
-
-
Cwe/sans [accessed 20.03.11]
-
CWE/SANS Top 25 most dangerous software errors [accessed 20.03.11] 2010 http://cwe.mitre.org/top25/
-
(2010)
Top 25 Most Dangerous Software Errors
-
-
-
11
-
-
84861100596
-
JavaScript: Mobility & ubiquity
-
G. Barthe, Y. Mantel, P. Müller, A.C. Myers, A. Sabelfeld
-
B. Eich JavaScript: mobility & ubiquity G. Barthe, Y. Mantel, P. Müller, A.C. Myers, A. Sabelfeld, Mobility, ubiquity and security. Dagstuhl, Germany: Internationales Begegnungs-und Forschungszentrum für Informatik (IBFI); number 07091 in Dagstuhl seminar proceedings 2007
-
(2007)
Mobility, Ubiquity and Security. Dagstuhl, Germany: Internationales Begegnungs-und Forschungszentrum für Informatik (IBFI); Number 07091 in Dagstuhl Seminar Proceedings
-
-
Eich, B.1
-
13
-
-
0003415244
-
-
R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, and P. Leach Hypertext Transfer Protocol - HTTP/1.1 1999
-
(1999)
Hypertext Transfer Protocol - HTTP/1.1
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Masinter, L.5
Leach, P.6
-
15
-
-
35348860223
-
Defeating script injection attacks with browser-enforced embedded policies
-
DOI 10.1145/1242572.1242654, 16th International World Wide Web Conference, WWW2007
-
T. Jim, N. Swamy, and M. Hicks Defeating scripting attacks with browser-enforced embedded policies Proceedings of the international World Wide Web conference (WWW) 2007 ACM Banff, Alberta, Canada 601 610 (Pubitemid 47582289)
-
(2007)
16th International World Wide Web Conference, WWW2007
, pp. 601-610
-
-
Jim, T.1
Swamy, N.2
Hicks, M.3
-
16
-
-
14844317200
-
Countering code-injection attacks with instruction-set randomization
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
G.S. Kc, A.D. Keromytis, and V. Prevelakis Countering code-injection attacks with instruction-set randomization CCS '03: Proceedings of the 10th ACM conference on computer and communications security 2003 ACM Washington D.C., USA 272 280 (Pubitemid 40673809)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 272-280
-
-
Kc, G.S.1
Keromytis, A.D.2
Prevelakis, V.3
-
17
-
-
33751032654
-
Noxes: A client-side solution for mitigating cross-site scripting attacks
-
Applied Computing 2006 - The 21st Annual ACM Symposium on Applied Computing - Proceedings of the 2006 ACM Symposium on Applied Computing
-
E. Kirda, C. Kruegel, G. Vigna, and N. Jovanovic Noxes: a client-side solution for mitigating cross site scripting attacks Proceedings of the ACM symposium on applied computing (SAC) 2006 330 337 Dijon, France (Pubitemid 44758802)
-
(2006)
Proceedings of the ACM Symposium on Applied Computing
, vol.1
, pp. 330-337
-
-
Kirda, E.1
Kruegel, C.2
Vigna, G.3
Jovanovic, N.4
-
20
-
-
84861092053
-
-
Last accessed: Mar 20, 2011
-
G. Markham Script Keys Last accessed: Mar 20, 2011 2005 http://www.gerv.net/security/script-keys/
-
(2005)
Script Keys
-
-
Markham, G.1
-
21
-
-
34848813573
-
-
Last accessed: Mar 20, 2011
-
G. Markham Content restrictions Last accessed: Mar 20, 2011 2007 http://www.gerv.net/security/content-restrictions/
-
(2007)
Content Restrictions
-
-
Markham, G.1
-
22
-
-
77955186827
-
ConScript: Specifying and enforcing fine-grained security policies for JavaScript in the browser
-
IEEE Computer Society Berkeley, CA, USA
-
L.A. Meyerovich, and B. Livshits ConScript: specifying and enforcing fine-grained security policies for JavaScript in the browser IEEE Symposium on security and privacy 2010 IEEE Computer Society Berkeley, CA, USA 481 496
-
(2010)
IEEE Symposium on Security and Privacy
, pp. 481-496
-
-
Meyerovich, L.A.1
Livshits, B.2
-
23
-
-
84861098939
-
-
Microsoft Developer Network (msdn) Last accessed: Mar 20, 2011
-
Microsoft Developer Network (MSDN) About conditional comments Last accessed: Mar 20, 2011 2007 http://msdn.microsoft.com/en-us/library/ms537512. aspx
-
(2007)
About Conditional Comments
-
-
-
27
-
-
84871349041
-
Automatically hardening web applications using precise tainting
-
Chiba, Japan
-
A. Nguyen-Tuong, S. Guarnieri, D. Greene, J. Shirley, and D. Evans Automatically hardening web applications using precise tainting Proceedings of the 20th IFIP international information security conference (SEC 2005) 2005 372 382 Chiba, Japan
-
(2005)
Proceedings of the 20th IFIP International Information Security Conference (SEC 2005)
, pp. 372-382
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Shirley, J.4
Evans, D.5
-
28
-
-
84861100219
-
-
[accessed 20.03.11]
-
Opera Browser. http://www.opera.com/browser/; 2008. [accessed 20.03.11].
-
(2008)
Opera Browser
-
-
-
30
-
-
84861092109
-
-
[accessed 20.03.11]
-
D. Ross IE8 security part IV: the XSS filter [accessed 20.03.11] 2008 http://blogs.msdn.com/b/ie/archive/2008/07/02/ie8-security-part-iv-the-xss- filter.aspx
-
(2008)
IE8 Security Part IV: The XSS Filter
-
-
Ross, D.1
-
32
-
-
84861098941
-
-
Sahi [accessed 20.03.11]
-
Sahi http://sahi.co.in/; 2011. [accessed 20.03.11].
-
(2011)
-
-
-
33
-
-
84861094308
-
-
Samy [accessed 20.03.11]
-
Samy Technical explanation of the MySpace worm [accessed 20.03.11] 2006 http://web.archive.org/web/20060208182348/namb.la/popular/tech.html
-
(2006)
Technical Explanation of the MySpace Worm
-
-
-
34
-
-
84861100329
-
-
[accessed 20.03.11]
-
Selenium IDE. http://seleniumhq.org/projects/ide/; 2011. [accessed 20.03.11].
-
(2011)
Selenium IDE
-
-
-
35
-
-
84861098940
-
-
[accessed 20.03.11]
-
O. Shezaf The universal XSS PDF vulnerability [accessed 20.03.11] 2007 http://www.owasp.org/images/4/4b/OWASP-IL-The-Universal-XSS-PDF-Vulnerability
-
(2007)
The Universal XSS PDF Vulnerability
-
-
Shezaf, O.1
-
36
-
-
59149095353
-
-
[accessed 20.03.11]
-
Smarty Template Engine. http://www.smarty.net/; 2008. [accessed 20.03.11].
-
(2008)
Smarty Template Engine
-
-
-
37
-
-
77954584716
-
Reining in the web with content security policy
-
ACM Raleigh, North Carolina, USA
-
S. Stamm, B. Sterne, and G. Markham Reining in the web with content security policy Proceedings of the 19th international World Wide Web conference (WWW) 2010 ACM Raleigh, North Carolina, USA 921 930
-
(2010)
Proceedings of the 19th International World Wide Web Conference (WWW)
, pp. 921-930
-
-
Stamm, S.1
Sterne, B.2
Markham, G.3
-
39
-
-
77954572680
-
Alhambra: A system for creating, enforcing, and testing browser security policies
-
ACM Raleigh, North Carolina, USA
-
S. Tang, C. Grier, O. Aciicmez, and S.T. King Alhambra: a system for creating, enforcing, and testing browser security policies Proceedings of the 19th International World Wide Web conference (WWW) 2010 ACM Raleigh, North Carolina, USA 941 950
-
(2010)
Proceedings of the 19th International World Wide Web Conference (WWW)
, pp. 941-950
-
-
Tang, S.1
Grier, C.2
Aciicmez, O.3
King, S.T.4
-
40
-
-
82155200850
-
Blueprint: Robust prevention of cross-site scripting attacks for existing browsers
-
IEEE Computer Society Berkeley, CA, USA
-
M. Ter Louw, and V.N. Venkatakrishnan Blueprint: robust prevention of cross-site scripting attacks for existing browsers IEEE symposium on security and privacy 2009 IEEE Computer Society Berkeley, CA, USA 331 346
-
(2009)
IEEE Symposium on Security and Privacy
, pp. 331-346
-
-
Ter Louw, M.1
Venkatakrishnan, V.N.2
-
41
-
-
79958739058
-
-
Open Web Application Security Project T. [accessed 20.03.11]
-
The Open Web Application Security Project Cross-site scripting (XSS) [accessed 20.03.11] 2010 http://www.owasp.org/index.php/Cross-site-Scripting- %2528xSS%2529
-
(2010)
Cross-site Scripting (XSS)
-
-
-
42
-
-
84861100599
-
-
TikiWiki CMS/groupware [accessed 20.03.11]
-
TikiWiki CMS/groupware. http://info.tikiwiki.org/tiki-index.php; 2010. [accessed 20.03.11].
-
(2010)
-
-
-
45
-
-
84887309913
-
Vigna G cross-site scripting prevention with dynamic data tainting and static analysis
-
San Diego, CA
-
P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, and C. Kruegel Vigna G cross-site scripting prevention with dynamic data tainting and static analysis Proceedings of the network and distributed system security symposium (NDSS) 2007 San Diego, CA
-
(2007)
Proceedings of the Network and Distributed System Security Symposium (NDSS)
-
-
Vogt, P.1
Nentwich, F.2
Jovanovic, N.3
Kirda, E.4
Kruegel, C.5
-
46
-
-
67650077365
-
Sound and precise analysis of web applications for injection vulnerabilities
-
DOI 10.1145/1250734.1250739, PLDI'07: Proceedings of the 2007 ACM SIGPLAN Conference on Programming Language Design and Implementation
-
G. Wassermann, and Z. Su Sound and precise analysis of web applications for injection vulnerabilities Proceedings of the ACM SIGPLAN 2007 conference on programming language design and implementation 2007 ACM Press San Diego, CA 32 41 New York, NY, USA (Pubitemid 47630673)
-
(2007)
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI)
, pp. 32-41
-
-
Wassermann, G.1
Su, Z.2
-
48
-
-
70349932797
-
SWAP: Mitigating XSS attacks using a reverse proxy
-
IEEE Computer Society Washington, DC, USA
-
P. Wurzinger, C. Platzer, C. Ludl, E. Kirda, and C. Kruegel SWAP: mitigating XSS attacks using a reverse proxy Proceedings of the 2009 ICSE workshop on software engineering for secure systems 2009 IEEE Computer Society Washington, DC, USA 33 39
-
(2009)
Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems
, pp. 33-39
-
-
Wurzinger, P.1
Platzer, C.2
Ludl, C.3
Kirda, E.4
Kruegel, C.5
-
50
-
-
85038810709
-
Taint-Enhanced policy enforcement: A Practical approach to defeat a wide range of attacks
-
USENIX Association Vancouver, B.C., Canada
-
W. Xu, S. Bhatkar, and R. Sekar Taint-Enhanced policy enforcement: a Practical approach to defeat a wide range of attacks USENIX security symposium. USENIX the advanced computing systems Association 2006 USENIX Association Vancouver, B.C., Canada 121 136
-
(2006)
USENIX Security Symposium. USENIX the Advanced Computing Systems Association
, pp. 121-136
-
-
Xu, W.1
Bhatkar, S.2
Sekar, R.3
|