-
4
-
-
49949096891
-
Multi-module vulnerability analysis of web-based applications
-
D. Balzarotti, M. Cova, V. V. Felmetsger, and G. Vigna. Multi-module vulnerability analysis of web-based applications. In CCS'07: Proceedings of the 14th ACM conference on Computer and communications security, pages 25-35, 2007.
-
(2007)
CCS'07: Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 25-35
-
-
Balzarotti, D.1
Cova, M.2
Felmetsger, V.V.3
Vigna, G.4
-
5
-
-
78649986947
-
NoTamper: Automatic blackbox detection of parameter tampering opportunities in web applications
-
P. Bisht, T. Hinrichs, N. Skrupsky, R. Bobrowicz, and V. N. Venkatakrishnan. NoTamper: automatic blackbox detection of parameter tampering opportunities in web applications. In CCS'10: Proceedings of the 17th ACM conference on Computer and communications security, pages 607-618, 2010.
-
(2010)
CCS'10: Proceedings of the 17th ACM Conference on Computer and Communications Security
, pp. 607-618
-
-
Bisht, P.1
Hinrichs, T.2
Skrupsky, N.3
Bobrowicz, R.4
Venkatakrishnan, V.N.5
-
7
-
-
38149011298
-
Swaddler: An approach for the anomaly-based detection of state violations in web applications
-
M. Cova, D. Balzarotti, V. Felmetsger, and G. Vigna. Swaddler: An Approach for the Anomaly-based Detection of State Violations in Web Applications. In RAID'07: Proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection, pages 63-86, 2007.
-
(2007)
RAID'07: Proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection
, pp. 63-86
-
-
Cova, M.1
Balzarotti, D.2
Felmetsger, V.3
Vigna, G.4
-
8
-
-
77954616479
-
Splitter: A proxy-based approach for post-migration testing of web applications
-
X. Ding, H. Huang, Y. Ruan, A. Shaikh, B. Peterson, and X. Zhang. Splitter: a proxy-based approach for post-migration testing of web applications. In EuroSys'10: Proceedings of the 5th European conference on Computer systems, pages 97-110, 2010.
-
(2010)
EuroSys'10: Proceedings of the 5th European Conference on Computer Systems
, pp. 97-110
-
-
Ding, X.1
Huang, H.2
Ruan, Y.3
Shaikh, A.4
Peterson, B.5
Zhang, X.6
-
9
-
-
0035250541
-
Dynamically discovering likely program invariants to support program evolution
-
DOI 10.1109/32.908957
-
M. D. Ernst, J. Cockrell, W. G. Griswold, and D. Notkin. Dynamically discovering likely program invariants to support program evolution. IEEE Transactions on Software Engineering, 27(2):99-123, Feb. 2001. (Pubitemid 32254259)
-
(2001)
IEEE Transactions on Software Engineering
, vol.27
, Issue.2
, pp. 99-123
-
-
Ernst, M.D.1
Cockrell, J.2
Griswold, W.G.3
Notkin, D.4
-
10
-
-
84894088425
-
Toward automated detection of logic vulnerabilities in web applications
-
V. Felmetsger, L. Cavedon, C. Kruegel, and G. Vigna. Toward Automated Detection of Logic Vulnerabilities in Web Applications. In USENIX'10: Proceedings of the 19th conference on USENIX Security Symposium, pages 143-160, 2010.
-
(2010)
USENIX'10: Proceedings of the 19th Conference on USENIX Security Symposium
, pp. 143-160
-
-
Felmetsger, V.1
Cavedon, L.2
Kruegel, C.3
Vigna, G.4
-
11
-
-
33846369107
-
Learning DFA representations of HTTP for protecting web applications
-
DOI 10.1016/j.comnet.2006.09.016, PII S1389128606002416, From Intrusion Detection to Self-Protection
-
K. L. Ingham, A. Somayaji, J. Burge, and S. Forrest. Learning dfa representations of http for protecting web applications. Computer Networks and Isdn Systems, 51:1239-1255, 2007. (Pubitemid 46131444)
-
(2007)
Computer Networks
, vol.51
, Issue.5
, pp. 1239-1255
-
-
Ingham, K.L.1
Somayaji, A.2
Burge, J.3
Forrest, S.4
-
12
-
-
33751027156
-
Pixy: A static analysis tool for detecting web application vulnerabilities (Short paper)
-
DOI 10.1109/SP.2006.29, 1624016, Proceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006
-
N. Jovanovic, C. Kruegel, and E. Kirda. Pixy: A static analysis tool for detecting web application vulnerabilities (short paper). In S&P'06: Proceedings of the 27th IEEE Symposium on Security & Privacy, pages 258-263, 2006. (Pubitemid 44753727)
-
(2006)
Proceedings - IEEE Symposium on Security and Privacy
, vol.2006
, pp. 258-263
-
-
Jovanovic, N.1
Kruegel, C.2
Kirda, E.3
-
13
-
-
79951930082
-
Text: Automatic template extraction from heterogeneous web pages
-
C. Kim and K. Shim. Text: Automatic template extraction from heterogeneous web pages. IEEE Trans. Knowl. Data Eng., 23(4):612-626, 2011.
-
(2011)
IEEE Trans. Knowl. Data Eng.
, vol.23
, Issue.4
, pp. 612-626
-
-
Kim, C.1
Shim, K.2
-
14
-
-
77949371828
-
From uncertainty to belief: Inferring the specification within
-
T. Kremenek, P. Twohey, G. Back, A. Ng, and D. Engler. From uncertainty to belief: inferring the specification within. In OSDI '06: Proceedings of the 7th symposium on Operating systems design and implementation, pages 161-176, 2006.
-
(2006)
OSDI '06: Proceedings of the 7th Symposium on Operating Systems Design and Implementation
, pp. 161-176
-
-
Kremenek, T.1
Twohey, P.2
Back, G.3
Ng, A.4
Engler, D.5
-
17
-
-
84862952879
-
-
OsCommerce Inc. http://www.oscommerce.com/.
-
-
-
-
18
-
-
84862952880
-
-
OWASP WebScarab Project. https://www.owasp.org/index.php/category:owasp webscarab project.
-
-
-
-
19
-
-
4644340823
-
Automatic web news extraction using tree edit distance
-
Thirteenth International World Wide Web Conference Proceedings, WWW2004
-
D. C. Reis, P. B. Golgher, A. S. Silva, and A. F. Laender. Automatic web news extraction using tree edit distance. In WWW '04: Proceedings of the 13th international conference on World Wide Web, pages 502-511, 2004. (Pubitemid 40752784)
-
(2004)
Thirteenth International World Wide Web Conference Proceedings, WWW2004
, pp. 502-511
-
-
De Reis, D.C.1
Golgher, P.B.2
Da Silva, A.S.3
Laender, A.H.F.4
-
22
-
-
84862943869
-
-
Symantec internet security threat report 2009. http://www.symantec.com/ business/threatreport/.
-
(2009)
-
-
-
23
-
-
62349108537
-
A stateful intrusion detection system for world-wide web servers
-
G. Vigna, W. Robertson, V. Kher, and R. A. Kemmerer. A stateful intrusion detection system for world-wide web servers. In ACSAC'03: Proceedings of the Annual Computer Security Applications Conference, pages 34-43, 2003.
-
(2003)
ACSAC'03: Proceedings of the Annual Computer Security Applications Conference
, pp. 34-43
-
-
Vigna, G.1
Robertson, W.2
Kher, V.3
Kemmerer, R.A.4
-
24
-
-
84862943870
-
-
Wackopicko. https://github.com/adamdoupe/wackopicko.
-
-
-
-
26
-
-
34247116992
-
Perracotta: Mining temporal API rules from imperfect traces
-
Proceeding of the 28th International Conference on Software Engineering 2006, ICSE '06
-
J. Yang, D. Evans, D. Bhardwaj, T. Bhat, and M. Das. Perracotta: mining temporal api rules from imperfect traces. In ICSE '06: Proceedings of the 28th international conference on Software engineering, pages 282-291, 2006. (Pubitemid 46600925)
-
(2006)
Proceedings - International Conference on Software Engineering
, vol.2006
, pp. 282-291
-
-
Yang, J.1
Evans, D.2
Bhardwaj, D.3
Bhat, T.4
Das, M.5
|