메뉴 건너뛰기




Volumn , Issue , 2012, Pages 310-313

Predicting common web application vulnerabilities from input validation and sanitization code patterns

Author keywords

Defect prediction; Empirical study; Input validation and sanitization; Static code attributes; Web application vulnerabilities

Indexed keywords

DEFECT PREDICTION; EMPIRICAL STUDIES; SANITIZATION; STATIC CODES; WEB APPLICATION VULNERABILITY;

EID: 84866920422     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2351676.2351733     Document Type: Conference Paper
Times cited : (78)

References (14)
  • 1
    • 71649110371 scopus 로고    scopus 로고
    • A systematic and comprehensive investigation of methods to build and evaluate fault prediction models
    • Arisholma, E., Briand, L. C., and Johannessen, E. B. 2010. A systematic and comprehensive investigation of methods to build and evaluate fault prediction models. Journal of Systems and Software, 83, 1, 2-17.
    • (2010) Journal of Systems and Software , vol.83 , Issue.1 , pp. 2-17
    • Arisholma, E.1    Briand, L.C.2    Johannessen, E.B.3
  • 2
    • 29644438050 scopus 로고    scopus 로고
    • Statistical comparisons of classifiers over multiple data sets
    • Demšar, J. 2006. Statistical comparisons of classifiers over multiple data sets. Journal of Machine Learning Research, 7, 1-30.
    • (2006) Journal of Machine Learning Research , vol.7 , pp. 1-30
    • Demšar, J.1
  • 5
    • 49349089233 scopus 로고    scopus 로고
    • Benchmarking classification models for software defect prediction: A proposed framework and novel findings
    • Lessmann, S., Baesens, B., Mues, C., and Pietsch, S. 2008. Benchmarking classification models for software defect prediction: a proposed framework and novel findings. IEEE Transactions on Software Engineering, 34, 4, 485-496.
    • (2008) IEEE Transactions on Software Engineering , vol.34 , Issue.4 , pp. 485-496
    • Lessmann, S.1    Baesens, B.2    Mues, C.3    Pietsch, S.4
  • 6
    • 85084163766 scopus 로고    scopus 로고
    • Automatic generation of XSS and SQL injection attacks with goal-directed model checking
    • Martin, M. and Lam, M. S. 2008. Automatic generation of XSS and SQL injection attacks with goal-directed model checking. In Proceedings of the 17th USENIX Security Symposium. 31-43.
    • (2008) Proceedings of the 17th USENIX Security Symposium , pp. 31-43
    • Martin, M.1    Lam, M.S.2
  • 9
    • 84866889170 scopus 로고    scopus 로고
    • accessed January 2012
    • OWASP. Top Ten project 2010. http://www.owasp.org, accessed January 2012.
    • (2010) Top Ten Project
  • 14


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.