메뉴 건너뛰기




Volumn 55, Issue 10, 2013, Pages 1767-1780

Predicting SQL injection and cross site scripting vulnerabilities through mining input sanitization patterns

Author keywords

Data mining; Empirical study; Input sanitization; Static code attributes; Vulnerability prediction; Web application vulnerability

Indexed keywords

CROSS-SITE SCRIPTING; DYNAMIC TAINT ANALYSIS; EMPIRICAL STUDIES; HISTORICAL INFORMATION; SANITIZATION; STATIC CODES; VULNERABILITY DETECTION; WEB APPLICATION VULNERABILITY;

EID: 84880843062     PISSN: 09505849     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.infsof.2013.04.002     Document Type: Article
Times cited : (80)

References (45)
  • 3
    • 71649110371 scopus 로고    scopus 로고
    • A systematic and comprehensive investigation of methods to build and evaluate fault prediction models
    • E. Arisholm, L.C. Briand, and E.B. Johannessen A systematic and comprehensive investigation of methods to build and evaluate fault prediction models Journal of Systems and Software 83 1 2010 2 17
    • (2010) Journal of Systems and Software , vol.83 , Issue.1 , pp. 2-17
    • Arisholm, E.1    Briand, L.C.2    Johannessen, E.B.3
  • 4
    • 84880834095 scopus 로고    scopus 로고
    • BugTraq. (accessed March 2011)
    • BugTraq. < http://www.securityfocus.com/archive/1 > (accessed March 2011).
  • 5
    • 29644438050 scopus 로고    scopus 로고
    • Statistical comparisons of classifiers over multiple data sets
    • J. Demšar Statistical comparisons of classifiers over multiple data sets Journal of Machine Learning Research 7 2006 1 30 (Pubitemid 43022939)
    • (2006) Journal of Machine Learning Research , vol.7 , pp. 1-30
    • Demsar, J.1
  • 6
    • 68349098892 scopus 로고    scopus 로고
    • Performance of five two-sample location tests for skewed distributions with unequal variances
    • M.W. Fagerland, and L. Sandvik Performance of five two-sample location tests for skewed distributions with unequal variances Contemporary Clinical Trials 30 5 2009 490 496
    • (2009) Contemporary Clinical Trials , vol.30 , Issue.5 , pp. 490-496
    • Fagerland, M.W.1    Sandvik, L.2
  • 10
    • 79952838952 scopus 로고    scopus 로고
    • Choosing software metrics for defect prediction: An investigation on feature selection techniques
    • K. Gao, T.M. Khoshgoftaar, H. Wang, and N. Seliya Choosing software metrics for defect prediction: an investigation on feature selection techniques Software Practice and Experience 41 5 2011 579 606
    • (2011) Software Practice and Experience , vol.41 , Issue.5 , pp. 579-606
    • Gao, K.1    Khoshgoftaar, T.M.2    Wang, H.3    Seliya, N.4
  • 13
    • 33751027156 scopus 로고    scopus 로고
    • Pixy: A static analysis tool for detecting web application vulnerabilities (Short paper)
    • DOI 10.1109/SP.2006.29, 1624016, Proceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006
    • N. Jovanovic, C. Kruegel, E. Kirda, Pixy: a static analysis tool for detecting web application vulnerabilities, in: Proceedings of the IEEE Symposium on Security and Privacy, Berkeley/Oakland, CA, 2006, pp. 258-263. (Pubitemid 44753727)
    • (2006) Proceedings - IEEE Symposium on Security and Privacy , vol.2006 , pp. 258-263
    • Jovanovic, N.1    Kruegel, C.2    Kirda, E.3
  • 15
    • 77949879017 scopus 로고    scopus 로고
    • Automatic creation of SQL injection and cross-site scripting attacks
    • Vancouver, BC
    • A. Kiezun, P.J. Guo, K. Jayaraman, M.D. Ernst, Automatic creation of SQL injection and cross-site scripting attacks, in: Proceedings of the 31st International Conference on Software Engineering, Vancouver, BC, 2009, pp. 199-209.
    • (2009) Proceedings of the 31st International Conference on Software Engineering , pp. 199-209
    • Kiezun, A.1
  • 16
    • 49349089233 scopus 로고    scopus 로고
    • Benchmarking classification models for software defect prediction: A proposed framework and novel findings
    • S. Lessmann, B. Baesens, C. Mues, and S. Pietsch Benchmarking classification models for software defect prediction: a proposed framework and novel findings IEEE Transactions on Software Engineering 34 4 2008 485 496
    • (2008) IEEE Transactions on Software Engineering , vol.34 , Issue.4 , pp. 485-496
    • Lessmann, S.1    Baesens, B.2    Mues, C.3    Pietsch, S.4
  • 18
    • 85084163766 scopus 로고    scopus 로고
    • Automatic generation of XSS and SQL injection attacks with goal-directed model checking
    • San Jose, CA
    • M. Martin, M.S. Lam, Automatic generation of XSS and SQL injection attacks with goal-directed model checking, in: Proceedings of the 17th USENIX Security Symposium, San Jose, CA, 2008, pp. 31-43.
    • (2008) Proceedings of the 17th USENIX Security Symposium , pp. 31-43
    • Martin, M.1    Lam, M.S.2
  • 21
    • 33845782503 scopus 로고    scopus 로고
    • Data mining static code attributes to learn defect predictors
    • DOI 10.1109/TSE.2007.256941
    • T. Menzies, J. Greenwald, and A. Frank Data mining static code attributes to learn defect predictors IEEE Transactions on Software Engineering 33 1 2007 2 13 (Pubitemid 46002165)
    • (2007) IEEE Transactions on Software Engineering , vol.33 , Issue.1 , pp. 2-13
    • Menzies, T.1    Greenwald, J.2    Frank, A.3
  • 22
    • 77956972220 scopus 로고    scopus 로고
    • Defect prediction from static code features: Current results, limitations, new approaches
    • T. Menzies, Z. Milton, B. Turhan, B. Cukic, Y. Jiang, and A. Bener Defect prediction from static code features: current results, limitations, new approaches Automated Software Engineering 17 4 2010 375 407
    • (2010) Automated Software Engineering , vol.17 , Issue.4 , pp. 375-407
    • Menzies, T.1    Milton, Z.2    Turhan, B.3    Cukic, B.4    Jiang, Y.5    Bener, A.6
  • 25
    • 84880850922 scopus 로고    scopus 로고
    • OWASP (accessed January 2012)
    • OWASP. Top Ten Project 2010. < http://www.owasp.org > (accessed January 2012).
    • Top Ten Project 2010
  • 26
    • 84880850404 scopus 로고    scopus 로고
    • PhpMinerI
    • PhpMinerI. < http://sharlwinkhin.com/phpminer.html >.
  • 27
    • 84906049828 scopus 로고    scopus 로고
    • PROMISE (accessed November 2011)
    • PROMISE. Software Engineering Repository. < http://promise.site. uottawa.ca/SERepository/ > (accessed November 2011).
    • Software Engineering Repository
  • 30
    • 84855479474 scopus 로고    scopus 로고
    • Automated removal of cross site scripting vulnerabilities in web applications
    • L.K. Shar, and H.B.K. Tan Automated removal of cross site scripting vulnerabilities in web applications Information and Software Technology 54 5 2012 467 478
    • (2012) Information and Software Technology , vol.54 , Issue.5 , pp. 467-478
    • Shar, L.K.1    Tan, H.B.K.2
  • 33
    • 83555172467 scopus 로고    scopus 로고
    • Evaluating complexity, code churn, and developer activity metrics as indicators of software vulnerabilities
    • Y. Shin, A. Meneely, L. Williams, and J.A. Osborne Evaluating complexity, code churn, and developer activity metrics as indicators of software vulnerabilities IEEE Transactions on Software Engineering 37 6 2011 772 787
    • (2011) IEEE Transactions on Software Engineering , vol.37 , Issue.6 , pp. 772-787
    • Shin, Y.1    Meneely, A.2    Williams, L.3    Osborne, J.A.4
  • 37
    • 84880831784 scopus 로고    scopus 로고
    • (accessed March 2011)
    • Sourceforge. < http://www.sourceforge.net > (accessed March 2011).
  • 38
    • 57849137358 scopus 로고    scopus 로고
    • On automated prepared statement generation to remove SQL injection vulnerabilities
    • S. Thomas, L. Williams, and T. Xie On automated prepared statement generation to remove SQL injection vulnerabilities Information and Software Technology 51 3 2009 589 598
    • (2009) Information and Software Technology , vol.51 , Issue.3 , pp. 589-598
    • Thomas, S.1    Williams, L.2    Xie, T.3
  • 44
    • 84910681237 scopus 로고    scopus 로고
    • Static detection of security vulnerabilities in scripting languages
    • Vancouver, BC
    • Y. Xie, A. Aiken, Static detection of security vulnerabilities in scripting languages, in: Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, 2006, pp. 179-192.
    • (2006) Proceedings of the 15th USENIX Security Symposium , pp. 179-192
    • Xie, Y.1    Aiken, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.