-
3
-
-
84865285607
-
ViewPoints: Differential string analysis for discovering client and server-side input validation inconsistencies
-
Minneapolis, MN, USA
-
Alkhalaf, M., Bultan, T., Choudhary, S. R., Fazzini, M., Orso, A., and Kruegel, C. ViewPoints: Differential String Analysis for Discovering Client and Server-Side Input Validation Inconsistencies. In ISSTA'12: Proceedings of the 2011 International Symposium on Software Testing and Analysis (Minneapolis, MN, USA, 2012).
-
(2012)
ISSTA'12: Proceedings of the 2011 International Symposium on Software Testing and Analysis
-
-
Alkhalaf, M.1
Bultan, T.2
Choudhary, S.R.3
Fazzini, M.4
Orso, A.5
Kruegel, C.6
-
4
-
-
84863702961
-
Server-side verification of client behavior in online games
-
San Diego, CA, USA
-
Bethea, D., Cochran, R., and Reiter, M. Server-side Verification of Client Behavior in Online Games. In NDSS'10: Proceedings of the 17th Annual Network and Distributed System Security Symposium (San Diego, CA, USA, 2010).
-
(2010)
NDSS'10: Proceedings of the 17th Annual Network and Distributed System Security Symposium
-
-
Bethea, D.1
Cochran, R.2
Reiter, M.3
-
5
-
-
78649986947
-
NoTamper: Automatic blackbox detection of parameter tampering opportunities in web applications
-
Chicago, IL, USA
-
Bisht, P., Hinrichs, T., Skrupsky, N., Bobrowicz, R., and Venkatakrishnan, V. NoTamper: Automatic Blackbox Detection of Parameter Tampering Opportunities in Web Applications. In CCS'10: Proceedings of the 17th ACM Conference on Computer and Communications Security (Chicago, IL, USA, 2010).
-
(2010)
CCS'10: Proceedings of the 17th ACM Conference on Computer and Communications Security
-
-
Bisht, P.1
Hinrichs, T.2
Skrupsky, N.3
Bobrowicz, R.4
Venkatakrishnan, V.5
-
6
-
-
80755187789
-
WAPTEC: Whitebox analysis of web applications for parameter tampering exploit construction
-
Chicago, IL, USA
-
Bisht, P., Hinrichs, T., Skrupsky, N., and Venkatakrishnan, V. WAPTEC: Whitebox Analysis of Web Applications for Parameter Tampering Exploit Construction. In CCS'11: Proceedings of the 18th ACM Conference on Computer and Communications Security (Chicago, IL, USA, 2011).
-
(2011)
CCS'11: Proceedings of the 18th ACM Conference on Computer and Communications Security
-
-
Bisht, P.1
Hinrichs, T.2
Skrupsky, N.3
Venkatakrishnan, V.4
-
7
-
-
70450092979
-
Secure web application via automatic partitioning
-
Chong, S., Liu, J., Myers, A. C., Qi, X., Vikram, K., Zheng, L., and Zheng, X. Secure Web Application via Automatic Partitioning. SIGOPS Oper. Syst. Rev. 41, 6 (2007), 31{44.
-
(2007)
SIGOPS Oper. Syst. Rev.
, vol.41
, Issue.6
, pp. 31-44
-
-
Chong, S.1
Liu, J.2
Myers, A.C.3
Qi, X.4
Vikram, K.5
Zheng, L.6
Zheng, X.7
-
8
-
-
49049121259
-
Links: Web programming without tiers
-
Amsterdam, The Netherlands
-
Cooper, E., Lindley, S., Wadler, P., and Yallop, J. Links: Web Programming Without Tiers. In FMCO'06: Proceedings of the International Symposium on Formal Methods for Components and Objects (Amsterdam, The Netherlands, 2006).
-
(2006)
FMCO'06: Proceedings of the International Symposium on Formal Methods for Components and Objects
-
-
Cooper, E.1
Lindley, S.2
Wadler, P.3
Yallop, J.4
-
9
-
-
70849107905
-
Cross-tier, label-based security enforcement for web applications
-
Providence, RI, USA
-
Corcoran, B. J., Swamy, N., and Hicks, M. Cross-tier, Label-based Security Enforcement for Web Applications. In SIGMOD'09: Proceedings of the ACM SIGMOD International Conference on Management of Data (Providence, RI, USA, 2009).
-
(2009)
SIGMOD'09: Proceedings of the ACM SIGMOD International Conference on Management of Data
-
-
Corcoran, B.J.1
Swamy, N.2
Hicks, M.3
-
10
-
-
85084162795
-
Detecting manipulated remote call streams
-
Berkeley, CA, USA
-
Giffin, J. T., Jha, S., and Miller, B. P. Detecting Manipulated Remote Call Streams. In Security'02: Proceedings of the 11th USENIX Security Symposium (Berkeley, CA, USA, 2002).
-
(2002)
Security'02: Proceedings of the 11th USENIX Security Symposium
-
-
Giffin, J.T.1
Jha, S.2
Miller, B.P.3
-
11
-
-
84865621386
-
Using static analysis for ajax intrusion detection
-
Madrid, Spain
-
Guha, A., Krishnamurthi, S., and Jim, T. Using Static Analysis for Ajax Intrusion Detection. In WWW'09: Proceedings of the 18th International Conference on World Wide Web (Madrid, Spain, 2009).
-
(2009)
WWW'09: Proceedings of the 18th International Conference on World Wide Web
-
-
Guha, A.1
Krishnamurthi, S.2
Jim, T.3
-
13
-
-
50049083384
-
Preventing cross-site request forgery attacks
-
Baltimore, MD, USA
-
Jovanovic, N., Kirda, E., and Kruegel, C. Preventing Cross-site Request Forgery Attacks. In SecureComm'06: Proceedings of the Second IEEE Conference on Security and Privacy in Communications Networks (Baltimore, MD, USA, 2006).
-
(2006)
SecureComm'06: Proceedings of the Second IEEE Conference on Security and Privacy in Communications Networks
-
-
Jovanovic, N.1
Kirda, E.2
Kruegel, C.3
-
14
-
-
79958760983
-
Tailored shielding and bypass testing of web applications
-
IEEE Computer Society
-
Mouelhi, T., Traon, Y. L., Abgrall, E., Baudry, B., and Gombault, S. Tailored shielding and bypass testing of web applications. In ICST (2011), IEEE Computer Society, pp. 210{219.
-
(2011)
ICST
, pp. 210-219
-
-
Mouelhi, T.1
Traon, Y.L.2
Abgrall, E.3
Baudry, B.4
Gombault, S.5
-
15
-
-
77955220343
-
A symbolic execution framework for javascript
-
Oakland, CA, USA
-
Saxena, P., Akhawe, D., Hanna, S., Mao, F., McCamant, S., and Song, D. A Symbolic Execution Framework for JavaScript. In SP'10: Proceedings of the 31st IEEE Symposium on Security and Privacy (Oakland, CA, USA, 2010).
-
(2010)
SP'10: Proceedings of the 31st IEEE Symposium on Security and Privacy
-
-
Saxena, P.1
Akhawe, D.2
Hanna, S.3
Mao, F.4
McCamant, S.5
Song, D.6
-
16
-
-
84874856541
-
-
Simpleform website. http://blog.plataformatec.com.br/2010/06/simpleform- forms-made-easy/, 2011.
-
(2011)
Simpleform Website
-
-
-
17
-
-
74049104017
-
Ripley: Automatically securing distributed web applications through replicated execution
-
Chicago, IL, USA
-
Vikram, K., Prateek, A., and Livshits, B. Ripley: Automatically Securing Distributed Web Applications Through Replicated Execution. In CCS'09: Proceedings of the 16th Conference on Computer and Communications Security (Chicago, IL, USA, 2009).
-
(2009)
CCS'09: Proceedings of the 16th Conference on Computer and Communications Security
-
-
Vikram, K.1
Prateek, A.2
Livshits, B.3
-
18
-
-
80051991045
-
How to shop for free online- Security analysis of cashier-as-a-service based web stores
-
Oakland, CA, USA
-
Wang, R., Chen, S., Wang, X., and Qadeer, S. How to Shop for Free Online { Security Analysis of Cashier-as-a-Service Based Web Stores. In Oakland'11: Proceedings of the 2011 IEEE Symposium on Security and Privacy (Oakland, CA, USA, 2011).
-
(2011)
Oakland'11: Proceedings of the 2011 IEEE Symposium on Security and Privacy
-
-
Wang, R.1
Chen, S.2
Wang, X.3
Qadeer, S.4
|