메뉴 건너뛰기




Volumn , Issue , 2011, Pages 247-256

BLOCK: A Black-bOx approach for detection of state violation attacks towards web applications

Author keywords

Black box approach; Invariant; State violation attack; Web application security

Indexed keywords

APPLICATION LOGIC; BLACK BOX APPROACH; DETECTION SYSTEM; GENERAL APPROACH; INVARIANT; RUNTIMES; SCALE-UP; SENSITIVE INFORMATIONS; SOURCE CODES; STATE VIOLATION ATTACK; SYSTEM PROTOTYPE; WEB APPLICATION; WEB APPLICATION SECURITY; WEB REQUESTS;

EID: 84862915304     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2076732.2076767     Document Type: Conference Paper
Times cited : (36)

References (26)
  • 9
    • 0035250541 scopus 로고    scopus 로고
    • Dynamically discovering likely program invariants to support program evolution
    • DOI 10.1109/32.908957
    • M. D. Ernst, J. Cockrell, W. G. Griswold, and D. Notkin. Dynamically discovering likely program invariants to support program evolution. IEEE Transactions on Software Engineering, 27(2):99-123, Feb. 2001. (Pubitemid 32254259)
    • (2001) IEEE Transactions on Software Engineering , vol.27 , Issue.2 , pp. 99-123
    • Ernst, M.D.1    Cockrell, J.2    Griswold, W.G.3    Notkin, D.4
  • 11
    • 33846369107 scopus 로고    scopus 로고
    • Learning DFA representations of HTTP for protecting web applications
    • DOI 10.1016/j.comnet.2006.09.016, PII S1389128606002416, From Intrusion Detection to Self-Protection
    • K. L. Ingham, A. Somayaji, J. Burge, and S. Forrest. Learning dfa representations of http for protecting web applications. Computer Networks and Isdn Systems, 51:1239-1255, 2007. (Pubitemid 46131444)
    • (2007) Computer Networks , vol.51 , Issue.5 , pp. 1239-1255
    • Ingham, K.L.1    Somayaji, A.2    Burge, J.3    Forrest, S.4
  • 12
    • 33751027156 scopus 로고    scopus 로고
    • Pixy: A static analysis tool for detecting web application vulnerabilities (Short paper)
    • DOI 10.1109/SP.2006.29, 1624016, Proceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006
    • N. Jovanovic, C. Kruegel, and E. Kirda. Pixy: A static analysis tool for detecting web application vulnerabilities (short paper). In S&P'06: Proceedings of the 27th IEEE Symposium on Security & Privacy, pages 258-263, 2006. (Pubitemid 44753727)
    • (2006) Proceedings - IEEE Symposium on Security and Privacy , vol.2006 , pp. 258-263
    • Jovanovic, N.1    Kruegel, C.2    Kirda, E.3
  • 13
    • 79951930082 scopus 로고    scopus 로고
    • Text: Automatic template extraction from heterogeneous web pages
    • C. Kim and K. Shim. Text: Automatic template extraction from heterogeneous web pages. IEEE Trans. Knowl. Data Eng., 23(4):612-626, 2011.
    • (2011) IEEE Trans. Knowl. Data Eng. , vol.23 , Issue.4 , pp. 612-626
    • Kim, C.1    Shim, K.2
  • 17
    • 84862952879 scopus 로고    scopus 로고
    • OsCommerce Inc. http://www.oscommerce.com/.
  • 18
    • 84862952880 scopus 로고    scopus 로고
    • OWASP WebScarab Project. https://www.owasp.org/index.php/category:owasp webscarab project.
  • 22
    • 84862943869 scopus 로고    scopus 로고
    • Symantec internet security threat report 2009. http://www.symantec.com/ business/threatreport/.
    • (2009)
  • 24
    • 84862943870 scopus 로고    scopus 로고
    • Wackopicko. https://github.com/adamdoupe/wackopicko.
  • 26
    • 34247116992 scopus 로고    scopus 로고
    • Perracotta: Mining temporal API rules from imperfect traces
    • Proceeding of the 28th International Conference on Software Engineering 2006, ICSE '06
    • J. Yang, D. Evans, D. Bhardwaj, T. Bhat, and M. Das. Perracotta: mining temporal api rules from imperfect traces. In ICSE '06: Proceedings of the 28th international conference on Software engineering, pages 282-291, 2006. (Pubitemid 46600925)
    • (2006) Proceedings - International Conference on Software Engineering , vol.2006 , pp. 282-291
    • Yang, J.1    Evans, D.2    Bhardwaj, D.3    Bhat, T.4    Das, M.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.