메뉴 건너뛰기




Volumn 7793 LNCS, Issue , 2013, Pages 210-225

Andromeda: Accurate and scalable security analysis of web applications

Author keywords

Abstract Interpretation; Information Flow; Integrity; Security; Static Analysis; Taint Analysis

Indexed keywords

ABSTRACT INTERPRETATIONS; INFORMATION FLOWS; INTEGRITY; SECURITY; TAINT ANALYSIS;

EID: 84874382751     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-37057-1_15     Document Type: Conference Paper
Times cited : (110)

References (40)
  • 2
    • 0036086884 scopus 로고    scopus 로고
    • Using Programmer-Written Compiler Extensions to Catch Security Holes
    • Ashcraft, K., Engler, D.: Using Programmer-Written Compiler Extensions to Catch Security Holes. In: S&P (2002)
    • (2002) S&P
    • Ashcraft, K.1    Engler, D.2
  • 3
    • 0030260329 scopus 로고    scopus 로고
    • Fast static analysis of c++ virtual function calls
    • Bacon, D.F., Sweeney, P.F.: Fast static analysis of c++ virtual function calls. In: OOPSLA, pp. 324-341 (1996)
    • (1996) OOPSLA , pp. 324-341
    • Bacon, D.F.1    Sweeney, P.F.2
  • 4
    • 67649859970 scopus 로고    scopus 로고
    • Efficient and Extensible Security Enforcement Using Dynamic Data Flow Analysis
    • Chang, W., Streiff, B., Lin, C.: Efficient and Extensible Security Enforcement Using Dynamic Data Flow Analysis. In: CCS (2008)
    • (2008) CCS
    • Chang, W.1    Streiff, B.2    Lin, C.3
  • 6
    • 85050550846 scopus 로고
    • Abstract Interpretation: A Unified Lattice Model for Static Analysis of Programs by Construction or Approximation of Fixpoints
    • Cousot, P., Cousot, R.: Abstract Interpretation: A Unified Lattice Model for Static Analysis of Programs by Construction or Approximation of Fixpoints. In: POPL, pp. 238-252 (1977)
    • (1977) POPL , pp. 238-252
    • Cousot, P.1    Cousot, R.2
  • 7
    • 84948958710 scopus 로고
    • Optimization of Object-Oriented Programs Using Static Class Hierarchy Analysis
    • Olthoff, W. (ed.) ECOOP 1995. Springer, Heidelberg
    • Dean, J., Grove, D., Chambers, C.: Optimization of Object-Oriented Programs Using Static Class Hierarchy Analysis. In: Olthoff, W. (ed.) ECOOP 1995. LNCS, vol. 952, pp. 77-101. Springer, Heidelberg (1995)
    • (1995) LNCS , vol.952 , pp. 77-101
    • Dean, J.1    Grove, D.2    Chambers, C.3
  • 8
    • 0016949746 scopus 로고
    • A Lattice Model of Secure Information Flow
    • Denning, D.E.: A Lattice Model of Secure Information Flow. CACM 19(5) (1976)
    • (1976) CACM , vol.19 , Issue.5
    • Denning, D.E.1
  • 9
    • 0017517624 scopus 로고
    • Certification of Programs for Secure Information Flow
    • Denning, D.E., Denning, P.J.: Certification of Programs for Secure Information Flow. CACM 20(7) (1977)
    • (1977) CACM , vol.20 , Issue.7
    • Denning, D.E.1    Denning, P.J.2
  • 10
    • 0027061682 scopus 로고
    • A Storeless Model of Aliasing and Its Abstractions Using Finite Representations of Right-regular Equivalence Relations
    • Deutsch, A.: A Storeless Model of Aliasing and Its Abstractions Using Finite Representations of Right-regular Equivalence Relations. In: ICCL (1992)
    • (1992) ICCL
    • Deutsch, A.1
  • 11
    • 26444506226 scopus 로고    scopus 로고
    • Efficiently refactoring Java applications to use generic libraries
    • ECOOP 2005 - Object-Oriented Programming: 19th European Conference. Proceedings
    • Fuhrer, R., Tip, F., Kie?zun, A., Dolby, J., Keller, M.: Efficiently Refactoring Java Applications to Use Generic Libraries. In: Gao, X.-X. (ed.) ECOOP 2005. LNCS, vol. 3586, pp. 71-96. Springer, Heidelberg (2005) (Pubitemid 41435977)
    • (2005) Lecture Notes in Computer Science , vol.3586 , pp. 71-96
    • Fuhrer, R.1    Tip, F.2    Kiezun, A.3    Dolby, J.4    Keller, M.5
  • 12
    • 0020299523 scopus 로고
    • Security Policies and Security Models
    • Goguen, J.A., Meseguer, J.: Security Policies and Security Models. In: S&P (1982)
    • (1982) S&P
    • Goguen, J.A.1    Meseguer, J.2
  • 14
    • 80051918429 scopus 로고    scopus 로고
    • Information Flow Control for Java Based on Path Conditions in Dependence Graphs
    • Hammer, C., Krinke, J., Snelting, G.: Information Flow Control for Java Based on Path Conditions in Dependence Graphs. In: S&P (2006)
    • (2006) S&P
    • Hammer, C.1    Krinke, J.2    Snelting, G.3
  • 15
    • 0034837173 scopus 로고    scopus 로고
    • Demand-Driven Pointer Analysis
    • Heintze, N., Tardieu, O.: Demand-Driven Pointer Analysis. In: PLDI (2001)
    • (2001) PLDI
    • Heintze, N.1    Tardieu, O.2
  • 16
    • 35548979013 scopus 로고    scopus 로고
    • Context-Sensitive Points-to Analysis: Is ItWorth It
    • Lhoták, O., Hendren, L.J.: Context-Sensitive Points-to Analysis: Is ItWorth It. In: CC (2006)
    • (2006) CC
    • Lhoták, O.1    Hendren, L.J.2
  • 17
    • 84923564816 scopus 로고    scopus 로고
    • Finding Security Vulnerabilities in Java Applications with Static Analysis
    • Livshits, V.B., Lam, M.S.: Finding Security Vulnerabilities in Java Applications with Static Analysis. In: USENIX Security (2005)
    • (2005) USENIX Security
    • Livshits, V.B.1    Lam, M.S.2
  • 18
    • 57349180506 scopus 로고    scopus 로고
    • Quantitative Information Flow as Network Flow Capacity
    • McCamant, S., Ernst, M.D.: Quantitative Information Flow as Network Flow Capacity. In: PLDI (2008)
    • (2008) PLDI
    • McCamant, S.1    Ernst, M.D.2
  • 19
    • 33749823368 scopus 로고    scopus 로고
    • Static Approximation of Dynamically Generated Web Pages
    • Minamide, Y.: Static Approximation of Dynamically Generated Web Pages. In: WWW (2005)
    • (2005) WWW
    • Minamide, Y.1
  • 20
    • 0032646625 scopus 로고    scopus 로고
    • JFlow: Practical Mostly-static Information Flow Control
    • Myers, A.C.: JFlow: Practical Mostly-static Information Flow Control. In: POPL (1999)
    • (1999) POPL
    • Myers, A.C.1
  • 21
    • 0002934582 scopus 로고    scopus 로고
    • A Decentralized Model for Information Flow Control
    • Myers, A.C., Liskov, B.: A Decentralized Model for Information Flow Control. In: SOSP (1997)
    • (1997) SOSP
    • Myers, A.C.1    Liskov, B.2
  • 22
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
    • Newsome, J., Song, D.: Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In: NDSS (2005)
    • (2005) NDSS
    • Newsome, J.1    Song, D.2
  • 23
    • 26444502057 scopus 로고    scopus 로고
    • Interprocedural analysis for privileged code placement and tainted variable detection
    • ECOOP 2005 - Object-Oriented Programming: 19th European Conference. Proceedings
    • Pistoia, M., Flynn, R.J., Koved, L., Sreedhar, V.C.: Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection. In: Gao, X.-X. (ed.) ECOOP 2005. LNCS, vol. 3586, pp. 362-386. Springer, Heidelberg (2005) (Pubitemid 41435989)
    • (2005) Lecture Notes in Computer Science , vol.3586 , pp. 362-386
    • Pistoia, M.1    Flynn, R.J.2    Koved, L.3    Sreedhar, V.C.4
  • 24
    • 0029180939 scopus 로고
    • Precise Interprocedural Dataflow Analysis via Graph Reachability
    • Reps, T., Horwitz, S., Sagiv, M.: Precise Interprocedural Dataflow Analysis via Graph Reachability. In: POPL (1995)
    • (1995) POPL
    • Reps, T.1    Horwitz, S.2    Sagiv, M.3
  • 26
    • 84874360706 scopus 로고    scopus 로고
    • PhD thesis, State University of New York at Stony Brook, Stony Brook, NY, USA
    • Saha, D.: Incremental Evaluation of Tabled Logic Programs. PhD thesis, State University of New York at Stony Brook, Stony Brook, NY, USA (2006)
    • (2006) Incremental Evaluation of Tabled Logic Programs
    • Saha, D.1
  • 28
    • 33750912954 scopus 로고    scopus 로고
    • Efficent Path Conditions in Dependence Graphs for Software Safety Analysis
    • Snelting, G., Robschink, T., Krinke, J.: Efficent Path Conditions in Dependence Graphs for Software Safety Analysis. TOSEM, 15(4) (2006)
    • (2006) TOSEM , vol.15 , Issue.4
    • Snelting, G.1    Robschink, T.2    Krinke, J.3
  • 32
    • 80051944491 scopus 로고    scopus 로고
    • Path- and Index-sensitive String Analysis Based on Monadic Second-order Logic
    • Tateishi, T., Pistoia, M., Tripp, O.: Path- and Index-sensitive String Analysis Based on Monadic Second-order Logic. In: ISSTA (2011)
    • (2011) ISSTA
    • Tateishi, T.1    Pistoia, M.2    Tripp, O.3
  • 34
    • 0030370740 scopus 로고    scopus 로고
    • A Sound Type System for Secure Flow Analysis
    • Volpano, D., Irvine, C., Smith, G.: A Sound Type System for Secure Flow Analysis. JCS 4(2-3) (1996)
    • (1996) JCS , vol.4 , Issue.2-3
    • Volpano, D.1    Irvine, C.2    Smith, G.3
  • 35
    • 43649088003 scopus 로고    scopus 로고
    • Server-centric web frameworks: An overview
    • Vosloo, I., Kourie, D.G.: Server-centric web frameworks: An overview. ACM Comput. Surv. 40(2), 4:1-4:33 (2008)
    • (2008) ACM Comput. Surv. , vol.40 , Issue.2
    • Vosloo, I.1    Kourie, D.G.2
  • 36
    • 35449004893 scopus 로고    scopus 로고
    • Sound and Precise Analysis of Web Applications for Injection Vulnerabilities
    • Wassermann, G., Su, Z.: Sound and Precise Analysis of Web Applications for Injection Vulnerabilities. In: PLDI (2007)
    • (2007) PLDI
    • Wassermann, G.1    Su, Z.2
  • 37
    • 57349153984 scopus 로고    scopus 로고
    • Static Detection of Cross-site Scripting Vulnerabilities
    • Wassermann, G., Su, Z.: Static Detection of Cross-site Scripting Vulnerabilities. In: ICSE 2008 (2008)
    • (2008) ICSE 2008
    • Wassermann, G.1    Su, Z.2
  • 38
    • 8344251741 scopus 로고    scopus 로고
    • Cloning Based Context-Sensitive Pointer Alias Analysis Using Binary Decision Diagrams
    • Whaley, J., Lam, M.S.: Cloning Based Context-Sensitive Pointer Alias Analysis Using Binary Decision Diagrams. In: PLDI (2004)
    • (2004) PLDI
    • Whaley, J.1    Lam, M.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.