-
1
-
-
50249115131
-
Saner: Composing static and dynamic analysis to validate sanitization in web applications
-
BALZAROTTI, D., COVA, et al 2008. Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. In Proc. of 2008 IEEE Symposium on Security and Privacy, 387-401.
-
(2008)
Proc. of 2008 IEEE Symposium on Security and Privacy
, pp. 387-401
-
-
Balzarotti, D.1
Cova2
-
2
-
-
77955207391
-
State of the Art: Automated black-box web application vulnerability testing
-
BAU, J., BURSZTEIN, E., GUPTA, D., and MITCHELL, J., 2010. State of the Art: Automated Black-Box Web Application Vulnerability Testing. In Proc. of 2010 IEEE Symposium on Security and Privacy, 332-345.
-
(2010)
Proc. of 2010 IEEE Symposium on Security and Privacy
, pp. 332-345
-
-
Bau, J.1
Bursztein, E.2
Gupta, D.3
Mitchell, J.4
-
3
-
-
33644662135
-
OCL 1.4/5 vs. 2.0 expressions formal semantics and expressiveness
-
CENGARLE, M.V. and KNAPP, A., 2004. OCL 1.4/5 vs. 2.0 Expressions Formal semantics and expressiveness. Software and Systems Modeling 3, 1, 9-30.
-
(2004)
Software and Systems Modeling
, vol.3
, Issue.1
, pp. 9-30
-
-
Cengarle, M.V.1
Knapp, A.2
-
4
-
-
67649639279
-
A static analysis framework for database applications
-
DASGUPTA, A., NARASAYYA, V., and SYAMALA, M., 2009. A Static Analysis Framework for Database Applications. In Proc. of 2009 IEEE Int. Conf. on Data Engineering, 1403-1414.
-
(2009)
Proc. of 2009 IEEE Int. Conf. on Data Engineering
, pp. 1403-1414
-
-
Dasgupta, A.1
Narasayya, V.2
Syamala, M.3
-
5
-
-
84894088425
-
Toward automated detection of logic vulnerabilities in web applications
-
Washington, DC
-
FELMETSGER, V., et al, 2010. Toward automated detection of logic vulnerabilities in web applications. In 19th USENIX Conf. on Security, Washington, DC.
-
(2010)
19th USENIX Conf. on Security
-
-
Felmetsger, V.1
-
6
-
-
79960350209
-
HAMPI: A string solver for testing, analysis and vulnerability detection
-
UT
-
GANESH, V., et al, 2011. HAMPI: a string solver for testing, analysis and vulnerability detection. In Proc. of 23rd Int. Conf. on Computer aided verification Springer-Verlag, Snowbird, UT, 1-19.
-
(2011)
Proc. of 23rd Int. Conf. on Computer Aided Verification Springer-Verlag, Snowbird
, pp. 1-19
-
-
Ganesh, V.1
-
7
-
-
34547379435
-
Positive tainting and syntax-aware evaluation to counter SQL injection attacks
-
Using, Oregon
-
HALFOND, W.G.J., ORSO, A., and MANOLIOS, P., 2006. Using positive tainting and syntax-aware evaluation to counter SQL injection attacks. In 14th ACM Int. symposium on Foundations of software engineering, Oregon, 175-185.
-
(2006)
14th ACM Int. Symposium on Foundations of Software Engineering
, pp. 175-185
-
-
Halfond, W.G.J.1
Orso, A.2
Manolios, P.3
-
8
-
-
84970882954
-
Fast and precise sanitizer analysis with BEK
-
San Francisco, CA2011
-
HOOIMEIJER, P., et al, 2011. Fast and precise sanitizer analysis with BEK. In 20th USENIX Conf. on Security (San Francisco, CA2011).
-
(2011)
20th USENIX Conf. on Security
-
-
Hooimeijer, P.1
-
9
-
-
33751027156
-
Pixy: A static analysis tool for detecting Web application vulnerabilities
-
JOVANOVIC, N., KRUEGEL, C., et al, 2006. Pixy: a static analysis tool for detecting Web application vulnerabilities. In 2006 IEEE Symposium on Security and Privacy, 258-263.
-
(2006)
2006 IEEE Symposium on Security and Privacy
, pp. 258-263
-
-
Jovanovic, N.1
Kruegel, C.2
-
10
-
-
34250673645
-
SecuBat: A web vulnerability scanner
-
Edinburgh
-
KALS, S., et al, 2006. SecuBat: a web vulnerability scanner. In 15th Int. Conf. on World Wide Web. Edinburgh, 247-256.
-
(2006)
15th Int. Conf. on World Wide Web.
, pp. 247-256
-
-
Kals, S.1
-
11
-
-
77949879017
-
Automatic creation of SQL Injection and cross-site scripting attacks
-
KIEYZUN, et al, 2009. Automatic creation of SQL Injection and cross-site scripting attacks. In Proc. of 31st Int.Conf. on Software Engineering, 199-209.
-
(2009)
Proc. of 31st Int.Conf. on Software Engineering
, pp. 199-209
-
-
Kieyzun1
-
12
-
-
77950880816
-
Securing web applications with static and dynamic information flow tracking
-
California, USA
-
LAM, M.S., MARTIN, M., LIVSHITS, B., and WHALEY, J., 2008. Securing web applications with static and dynamic information flow tracking. In 2008 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation, California, USA, 3-12.
-
(2008)
2008 ACM SIGPLAN Symposium on Partial Evaluation and Semantics-based Program Manipulation
, pp. 3-12
-
-
Lam, M.S.1
Martin, M.2
Livshits, B.3
Whaley, J.4
-
13
-
-
56349123085
-
Automated detection of code vulnerabilities based on program analysis and model checking
-
LEI, W., QIANG, Z., and PENGCHAO, Z., 2008. Automated Detection of Code Vulnerabilities Based on Program Analysis and Model Checking. In 8th IEEE Int. Conf. on Source Code Analysis and Manipulation, 165-173.
-
(2008)
8th IEEE Int. Conf. on Source Code Analysis and Manipulation
, pp. 165-173
-
-
Lei, W.1
Qiang, Z.2
Pengchao, Z.3
-
14
-
-
79957876122
-
An attack surface metric
-
MANADHATA, P.K. and WING, J.M., 2011. An Attack Surface Metric. IEEE Transactions on Software Engineering 37, 3, 371-386.
-
(2011)
IEEE Transactions on Software Engineering
, vol.37
, Issue.3
, pp. 371-386
-
-
Manadhata, P.K.1
Wing, J.M.2
-
15
-
-
31744432699
-
Finding application errors and security flaws using PQL: A program query language
-
CA, USA
-
MARTIN, M., LIVSHITS, B., and LAM, M.S., 2005. Finding application errors and security flaws using PQL: a program query language. In 20th annual Conf. on Objectoriented programming, systems, languages, and applications ACM, CA, USA, 365-383.
-
(2005)
20th Annual Conf. on Objectoriented Programming, Systems, Languages, and Applications ACM
, pp. 365-383
-
-
Martin, M.1
Livshits, B.2
Lam, M.S.3
-
16
-
-
70349923612
-
A hybrid analysis framework for detecting web application vulnerabilities
-
1656378
-
MONGA, M., PALEARI, R., and PASSERINI, E., 2009. A hybrid analysis framework for detecting web application vulnerabilities. In Proc. 2009 ICSE Workshop on Software Engineering for Secure Systems, 1656378, 25-32.
-
(2009)
Proc. 2009 ICSE Workshop on Software Engineering for Secure Systems
, pp. 25-32
-
-
Monga, M.1
Paleari, R.2
Passerini, E.3
-
18
-
-
57349153984
-
Static detection of cross-site scripting vulnerabilities
-
Leipzig, Germany
-
WASSERMANN, G. and SU, Z., 2008. Static detection of cross-site scripting vulnerabilities. In Proc. 30th Int. Conf. on Software engineering ACM, Leipzig, Germany, 171-180.
-
(2008)
Proc. 30th Int. Conf. on Software Engineering ACM
, pp. 171-180
-
-
Wassermann, G.1
Su, Z.2
-
19
-
-
80053073233
-
A systematic analysis of XSS sanitization in web application frameworks
-
Belgium
-
WEINBERGER, J., SAXENA, P., et al, 2011. A systematic analysis of XSS sanitization in web application frameworks. In 16th European Conf. on Research in computer security, Belgium, 150-171.
-
(2011)
16th European Conf. on Research in Computer Security
, pp. 150-171
-
-
Weinberger, J.1
Saxena, P.2
-
20
-
-
77953775928
-
Software vulnarabilities, prevention and detection methods: A reviw
-
WILLY JIMENEZ, A.M., ANA CAVALLI 2009. Software Vulnarabilities, Prevention and Detection Methods: A Reviw. In 2009 European Workshop on Security in Model Driven Architecture, Enschede, The Netherlands, 6-13.
-
(2009)
2009 European Workshop on Security in Model Driven Architecture, Enschede, the Netherlands
, pp. 6-13
-
-
Ana, C.A.V.A.L.L.I.1
Willy Jimenez, A.M.2
-
21
-
-
84855442829
-
Static program analysis assisted dynamic taint tracking for software vulnerability discovery
-
ZHANG, R., HUANG, S., et al, 2012. Static program analysis assisted dynamic taint tracking for software vulnerability discovery. Computers & Mathematics with Application 63, 2, 469-480.
-
(2012)
Computers & Mathematics with Application
, vol.63
, Issue.2
, pp. 469-480
-
-
Zhang, R.1
Huang, S.2
-
22
-
-
84866924976
-
An Incremental OCL Compiler for Modelling Environments
-
OCL Concepts and Tools
-
VAJK, T., MEZEI, G., and LEVEDOVSZKY T., 2008. An Incremental OCL Compiler for Modelling Environments. In Electronic Communications of the EASST, vol. Volume 15: OCL Concepts and Tools.
-
(2008)
Electronic Communications of the EASST
, vol.15
-
-
Vajk, T.1
Mezei, G.2
Levedovszky, T.3
|