-
2
-
-
77949464016
-
Candid: Dynamic candidate evaluations for automatic prevention of sql injection attacks
-
P. Bisht, P. Madhusudan, and V. Venkatakrishnan, "CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks," ACM Transactions on Information and System Security vol. 13, pp. 1-39, 2010.
-
(2010)
ACM Transactions on Information and System Security
, vol.13
, pp. 1-39
-
-
Bisht, P.1
Madhusudan, P.2
Venkatakrishnan, V.3
-
3
-
-
78650825676
-
Wasat-a new web authorization security analysis tool
-
C. Torrano-Gimenez, A. Perez-Villegas, and G. Alvarez, "WASAT-A New Web Authorization Security Analysis Tool," Web Application Security, pp. 39-49, 2010.
-
(2010)
Web Application Security
, pp. 39-49
-
-
Torrano-Gimenez, C.1
Perez-Villegas, A.2
Alvarez, G.3
-
4
-
-
0031648127
-
Accessing existing business data from the world wide web
-
C. S. Peng, S. K. Chen, J. Y. Chung, A. Roy-Chowdhury, and V. Srinivasan, "Accessing existing business data from the World Wide Web," IBM Systems Journal, vol. 37, pp. 115-132, 2010.
-
(2010)
IBM Systems Journal
, vol.37
, pp. 115-132
-
-
Peng, C.S.1
Chen, S.K.2
Chung, J.Y.3
Roy-Chowdhury, A.4
Srinivasan, V.5
-
8
-
-
33751027156
-
Pixy: A static analysis tool for detecting web application vulnerabilities
-
N. Jovanovic, C. Kruegel, and E. Kirda, "Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities," in IEEE Symposium on Security and Privacy, Oakland, CA, 2006, pp. 258-263.
-
(2006)
IEEE Symposium on Security and Privacy, Oakland, CA
, pp. 258-263
-
-
Jovanovic, N.1
Kruegel, C.2
Kirda, E.3
-
11
-
-
33745203758
-
Finding application errors and security flaws using pql: A program query language
-
M. Martin, B. Livshits, and M. S. Lam, "Finding application errors and security flaws using PQL: a program query language," ACM SIGPLAN Notices, vol. 40, pp. 365-383, 2005.
-
(2005)
ACM SIGPLAN Notices
, vol.40
, pp. 365-383
-
-
Martin, M.1
Livshits, B.2
Lam, M.S.3
-
12
-
-
19944365247
-
Securing web application code by static analysis and runtime protection
-
presented at the, New York, NY, USA
-
Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D.-T. Lee, and S.-Y. Kuo, "Securing web application code by static analysis and runtime protection," presented at the Proceedings of the 13th international conference on World Wide Web, New York, NY, USA, 2004.
-
(2004)
Proceedings of the 13th International Conference on World Wide Web
-
-
Huang, Y.-W.1
Yu, F.2
Hang, C.3
Tsai, C.-H.4
Lee, D.-T.5
Kuo, S.-Y.6
-
15
-
-
84871349041
-
Automatically hardening web applications using precise tainting
-
A. Nguyen-Tuong, S. Guarnieri, D. Greene, J. Shirley, and D. Evans, "Automatically hardening web applications using precise tainting," Security and Privacy in the Age of Ubiquitous Computing, pp. 295-307, 2005.
-
(2005)
Security and Privacy in the Age of Ubiquitous Computing
, pp. 295-307
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Shirley, J.4
Evans, D.5
-
16
-
-
49949109144
-
-
S. Bandhakavi, P. Bisht, P. Madhusudan, and V. Venkatakrishnan, "CANDID: preventing sql injection attacks using dynamic candidate evaluations," 2007, pp. 12-24.
-
(2007)
CANDID: Preventing Sql Injection Attacks Using Dynamic Candidate Evaluations
, pp. 12-24
-
-
Bandhakavi, S.1
Bisht, P.2
Madhusudan, P.3
Venkatakrishnan, V.4
-
17
-
-
84857951368
-
An approach to detection of sql injection vulnerabilities based on dynamic query matching
-
D. Das, U. Sharma, and D. Bhattacharyya, "An Approach to Detection of SQL Injection Vulnerabilities Based on Dynamic Query Matching," International Journal of Computer Applications, vol. 1, pp. 39-45, 2010.
-
(2010)
International Journal of Computer Applications
, vol.1
, pp. 39-45
-
-
Das, D.1
Sharma, U.2
Bhattacharyya, D.3
-
18
-
-
78649888272
-
Towards understanding malware behaviour by the extraction of api calls
-
M. Alazab, S. Venkataraman, and P. Watters, "Towards Understanding Malware Behaviour by the Extraction of API Calls," in Second Cybercrime and Trustworthy Computing Workshop, Ballarat, VIC, 2010, pp. 52-59.
-
(2010)
Second Cybercrime and Trustworthy Computing Workshop, Ballarat, VIC
, pp. 52-59
-
-
Alazab, M.1
Venkataraman, S.2
Watters, P.3
-
19
-
-
84868135965
-
Cybercrime: The case of obuscated malware
-
M. Alazab, S. Ventatraman, P. Watters, M. Alazab, and A. Alazab, "Cybercrime: The Case of Obuscated Malware," in 7th International Conference on Global Security, Safety & Sustainability, Thessaloniki, Greece, 2011.
-
(2011)
7th International Conference on Global Security, Safety & Sustainability, Thessaloniki, Greece
-
-
Alazab, M.1
Ventatraman, S.2
Watters, P.3
Alazab, M.4
Alazab, A.5
|