-
1
-
-
0004072686
-
-
Addison-Wesley
-
A. V. Aho, M. Lam, R. Sethi, and J. D. Ullman. Compilers: Principles, Techniques, and Tools. Addison-Wesley, 2007.
-
(2007)
Compilers: Principles, Techniques, and Tools
-
-
Aho, A.V.1
Lam, M.2
Sethi, R.3
Ullman, J.D.4
-
3
-
-
50249115131
-
Saner: Composing static and dynamic analysis to validate sanitization in web applications
-
May
-
D. Balzarotti, M. Cova, V. Felmetsger, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna. Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. In Proceedings of the IEEE Symposium on Security and Privacy, May 2008.
-
(2008)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Balzarotti, D.1
Cova, M.2
Felmetsger, V.3
Jovanovic, N.4
Kirda, E.5
Kruegel, C.6
Vigna, G.7
-
6
-
-
43049160731
-
Dynamic taint propagation: Finding vulnerabilities without attacking
-
January
-
B. Chess and J. West. Dynamic taint propagation: Finding vulnerabilities without attacking. Information Security Technical Reports, 13, January 2008.
-
(2008)
Information Security Technical Reports
, vol.13
-
-
Chess, B.1
West, J.2
-
10
-
-
79955570859
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. Mc-Daniel, and A. N. Sheth. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the Usenix Conference on Operating Systems Design and Implementation, 2010.
-
(2010)
Proceedings of the Usenix Conference on Operating Systems Design and Implementation
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
Mc-Daniel, P.6
Sheth, A.N.7
-
12
-
-
70350572805
-
Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs
-
Dec.
-
C. Hammer and G. Snelting. Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs. International Journal of Information Security, 8(6):399-422, Dec. 2009.
-
(2009)
International Journal of Information Security
, vol.8
, Issue.6
, pp. 399-422
-
-
Hammer, C.1
Snelting, G.2
-
15
-
-
84970882954
-
Fast and precise sanitizer analysis with BEK
-
Aug.
-
P. Hooimeijer, B. Livshits, D. Molnar, P. Saxena, and M. Veanes. Fast and precise sanitizer analysis with BEK. In Proceedings of the Usenix Security Symposium, Aug. 2011.
-
(2011)
Proceedings of the Usenix Security Symposium
-
-
Hooimeijer, P.1
Livshits, B.2
Molnar, D.3
Saxena, P.4
Veanes, M.5
-
16
-
-
0035337479
-
Partial redundancy elimination for access path expressions
-
May
-
A. L. Hosking, N. Nystrom, D. Whitlock, Q. Cutts, and A. Diwan. Partial redundancy elimination for access path expressions. Software Practice and Experience, 31, May 2001.
-
(2001)
Software Practice and Experience
, vol.31
-
-
Hosking, A.L.1
Nystrom, N.2
Whitlock, D.3
Cutts, Q.4
Diwan, A.5
-
17
-
-
19944365247
-
Securing web application code by static analysis and runtime protection
-
Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D.-T. Lee, and S.-Y. Kuo. Securing Web application code by static analysis and runtime protection. In Proceedings of the International Conference on World Wide Web, 2004.
-
(2004)
Proceedings of the International Conference on World Wide Web
-
-
Huang, Y.-W.1
Yu, F.2
Hang, C.3
Tsai, C.-H.4
Lee, D.-T.5
Kuo, S.-Y.6
-
19
-
-
85040923632
-
Automating security mediation placement
-
D. King, S. Jha, D. Muthukumaran, T. Jaeger, S. Jha, and S. A. Seshia. Automating security mediation placement. In Proceedings of the European Symposium on Programming, 2010.
-
(2010)
Proceedings of the European Symposium on Programming
-
-
King, D.1
Jha, S.2
Muthukumaran, D.3
Jaeger, T.4
Jha, S.5
Seshia, S.A.6
-
21
-
-
77949371828
-
From uncertainty to belief: Inferring the specification within
-
Nov.
-
T. Kremenek, P. Twohey, G. Back, A. Y. Ng, and D. R. Engler. From uncertainty to belief: Inferring the specification within. In Symposium on Operating Systems Design and Implementation, Nov. 2006.
-
(2006)
Symposium on Operating Systems Design and Implementation
-
-
Kremenek, T.1
Twohey, P.2
Back, G.3
Ng, A.Y.4
Engler, D.R.5
-
27
-
-
84874154748
-
-
Microsoft Corporation
-
Microsoft Corporation. Microsoft web protection library. http://wpl.codeplex.com/, 2012.
-
(2012)
Microsoft Web Protection Library
-
-
-
28
-
-
84877911231
-
The diary of a datum: An approach to modeling runtime complexity in framework-based applications
-
N. Mitchell, G. Sevitsky, and H. Srinivasan. The diary of a datum: an approach to modeling runtime complexity in framework-based applications. In Proceedings of the European Conference on Object-Oriented Programming, Systems, Languages, and Applications, 2005.
-
(2005)
Proceedings of the European Conference on Object-Oriented Programming, Systems, Languages, and Applications
-
-
Mitchell, N.1
Sevitsky, G.2
Srinivasan, H.3
-
29
-
-
84871349041
-
Automatically hardening web applications using precise tainting
-
A. Nguyen-Tuong, S. Guarnieri, D. Greene, J. Shirley, and D. Evans. Automatically hardening Web applications using precise tainting. In Proceedings of the IFIP International Information Security Conference, 2005.
-
(2005)
Proceedings of the IFIP International Information Security Conference
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Shirley, J.4
Evans, D.5
-
30
-
-
84874140835
-
-
OWASP
-
OWASP. OWASP-Java-HTML-sanitizer. http://code.google.com/p/owasp-java- html-sanitizer/, 2011.
-
(2011)
OWASP-Java-HTML-sanitizer
-
-
-
43
-
-
70450242742
-
TAJ: Effective taint analysis of web applications
-
O. Tripp, M. Pistoia, S. J. Fink, M. Sridharan, and O. Weisman. TAJ: effective taint analysis of web applications. In Proceedings of the Conference on Programming Language Design and Implementation, 2009.
-
(2009)
Proceedings of the Conference on Programming Language Design and Implementation
-
-
Tripp, O.1
Pistoia, M.2
Fink, S.J.3
Sridharan, M.4
Weisman, O.5
-
45
-
-
84857837117
-
Symbolic finite state transducers: Algorithms and applications
-
Jan.
-
M. Veanes, P. Hooimeijer, B. Livshits, D. Molnar, and N. Bjorner. Symbolic finite state transducers: Algorithms and applications. In Proceedings of the Sympolisium on Principles of Programming Languages, Jan. 2012.
-
(2012)
Proceedings of the Sympolisium on Principles of Programming Languages
-
-
Veanes, M.1
Hooimeijer, P.2
Livshits, B.3
Molnar, D.4
Bjorner, N.5
-
46
-
-
84869476644
-
A systematic analysis of XSS sanitization in web application frameworks
-
Sept.
-
J. Weinberger, P. Saxena, D. Akhawe, M. Finifter, R. Shin, and D. Song. A systematic analysis of XSS sanitization in web application frameworks. In Proceedings of the European Symposium on Research in Computer Security, Sept. 2011.
-
(2011)
Proceedings of the European Symposium on Research in Computer Security
-
-
Weinberger, J.1
Saxena, P.2
Akhawe, D.3
Finifter, M.4
Shin, R.5
Song, D.6
-
48
-
-
70449693353
-
-
E. Z. Yang. HTML purifier. http://code.google.com/p/owasp-java-html- sanitizer/, 2011.
-
(2011)
HTML Purifier
-
-
Yang, E.Z.1
|