메뉴 건너뛰기




Volumn , Issue , 2013, Pages 652-661

Path sensitive static analysis of web applications for remote code execution vulnerability detection

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL PROTOCOL; CONTEXT-SENSITIVE; EXECUTION PATHS; INTER-PROCEDURAL ANALYSIS; PATH SENSITIVES; PROTOTYPE SYSTEM; SECURITY THREATS; VULNERABILITY DETECTION;

EID: 84886397020     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSE.2013.6606611     Document Type: Conference Paper
Times cited : (68)

References (35)
  • 1
    • 84886440621 scopus 로고    scopus 로고
    • http://www.cs.purdue.edu/homes/zheng16/rce/index.html.
  • 2
    • 84886435657 scopus 로고    scopus 로고
    • OWASP PHP Top 5
    • OWASP PHP Top 5. https://www.owasp.org/index.php/PHP Top 5.
  • 3
    • 84886387637 scopus 로고    scopus 로고
    • IBM threat reports
    • IBM threat reports. http://www.ibm.com/services/us/iss/xforce/ trendreports/.
  • 4
    • 84886447244 scopus 로고    scopus 로고
    • Phc: open source PHP compiler
    • Phc: open source PHP compiler. http://www.phpcompiler.org/.
  • 5
    • 84865285607 scopus 로고    scopus 로고
    • ViewPoints: Differential String Analysis for Discovering Client and Server-Side Input Validation Inconsistencies
    • M. Alkhalaf, T. Bultan, S. Roy Choudhary, M. Fazzini, A. Orso and C. Kruegel. ViewPoints: Differential String Analysis for Discovering Client and Server-Side Input Validation Inconsistencies In ISSTA'12.
    • ISSTA'12
    • Alkhalaf, M.1    Bultan, T.2    Choudhary, S.R.3    Fazzini, M.4    Orso, A.5    Kruegel, C.6
  • 6
    • 84886432240 scopus 로고    scopus 로고
    • Understanding Web Applications through Dynamic Analysis
    • G. Antoniol, M. D. Penta and M. Zazzara. Understanding Web Applications through Dynamic Analysis. IWPC'04
    • IWPC'04
    • Antoniol, G.1    Penta, M.D.2    Zazzara, M.3
  • 8
    • 84886404861 scopus 로고    scopus 로고
    • Automated discovery of parameter pollution vulnerabilities in web applications
    • M. Balduzzi, C. T. Gimenez, D. Balzarotti and E. Kirda. Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications. In NDSS'11.
    • NDSS'11
    • Balduzzi, M.1    Gimenez, C.T.2    Balzarotti, D.3    Kirda, E.4
  • 9
    • 77954612255 scopus 로고    scopus 로고
    • Regular expressions considered harmful in client-side XSS filters
    • D. Bates, A. Barth and C. Jackson. Regular expressions considered harmful in client-side XSS filters. In WWW'10.
    • WWW'10
    • Bates, D.1    Barth, A.2    Jackson, C.3
  • 10
    • 84886412553 scopus 로고    scopus 로고
    • Deursen Automated security testing of web widget interactions
    • C. Bezemer, A. Mesbah and A. Deursen Automated security testing of web widget interactions. In FSE'09.
    • FSE'09
    • Bezemer, C.1    Mesbah, A.A.2
  • 11
    • 80755187789 scopus 로고    scopus 로고
    • WAPTEC: Whitebox analysis of web applications for parameter tampering exploit construction
    • P. Bisht, T. Hinrichs, N. Skrupsky and V. N. Venkatakrishnan. WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction. In CCS'11.
    • CCS'11
    • Bisht, P.1    Hinrichs, T.2    Skrupsky, N.3    Venkatakrishnan, V.N.4
  • 12
    • 84883692100 scopus 로고    scopus 로고
    • Path feasibility analysis for string-manipulating programs
    • N. Bjørner, N. Tillmann and A. Voronkov. Path Feasibility Analysis for String-Manipulating Programs. In TACAS '09.
    • TACAS '09
    • Bjørner, N.1    Tillmann, N.2    Voronkov, A.3
  • 14
    • 0036040604 scopus 로고    scopus 로고
    • ESP: Path-sensitive program verification in polynomial time
    • M. Das, S. Lerner, M. Seigel. ESP: path-sensitive program verification in polynomial time. In PLDI'02.
    • PLDI'02
    • Das, M.1    Lerner, S.2    Seigel, M.3
  • 15
    • 85087593111 scopus 로고    scopus 로고
    • Improving web application testing with user session data
    • S. G. Elbaum, S. Karre and G. Rothermel. Improving Web Application Testing with User Session Data. In ICSE'03.
    • ICSE'03
    • Elbaum, S.G.1    Karre, S.2    Rothermel, G.3
  • 16
    • 70349921536 scopus 로고    scopus 로고
    • Noncespaces: Using randomization to enforce information flow tracking and thwart cross-site scripting attacks
    • M. V. Gundy and H. Chen. Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks. In NDSS'09.
    • NDSS'09
    • Gundy, M.V.1    Chen, H.2
  • 17
    • 85008255060 scopus 로고    scopus 로고
    • Precise interface identification to improve testing and analysis of web applications
    • W. Halfond, S. Anand and A. Orso. Precise Interface Identification to Improve Testing and Analysis of Web Applications. In ISSTA'09.
    • ISSTA'09
    • Halfond, W.1    Anand, S.2    Orso, A.3
  • 18
    • 85085845043 scopus 로고    scopus 로고
    • Preventing sql injection attacks using amnesia
    • W. Halfond and A. Orso. Preventing SQL injection attacks using AMNESIA. In ICSE'06.
    • ICSE'06
    • Halfond, W.1    Orso, A.2
  • 19
  • 21
    • 82155200850 scopus 로고    scopus 로고
    • Blueprint: Robust prevention of cross-site scripting attacks for existing browsers
    • M. T. Louw and V. N. Venkatakrishnan. Blueprint: Robust Prevention of Cross-site Scripting Attacks for Existing Browsers. In SP'09.
    • SP'09
    • Louw, M.T.1    Venkatakrishnan, V.N.2
  • 23
    • 79551514936 scopus 로고    scopus 로고
    • Document structure integrity: A robust basis for cross-site scripting defense
    • Y. Nadji, P. Saxena and D. Song. Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense. In NDSS'09.
    • NDSS'09
    • Nadji, Y.1    Saxena, P.2    Song, D.3
  • 24
    • 84864229049 scopus 로고    scopus 로고
    • Automated repair of HTML generation errors in PHP applications using string constraint solving
    • H. Samimi, M. Schafer, S. Artzi, T. Millstein, F. Tip and L. Hendren. Automated repair of HTML generation errors in PHP applications using string constraint solving. In ICSE 2012.
    • ICSE 2012
    • Samimi, H.1    Schafer, M.2    Artzi, S.3    Millstein, T.4    Tip, F.5    Hendren, L.6
  • 26
    • 80755187784 scopus 로고    scopus 로고
    • SCRIPTGARD: Automatic context-sensitive sanitization for large-scale legacy web applications
    • P. Saxena, D. Molnar, B. Livshits. SCRIPTGARD: automatic context-sensitive sanitization for large-scale legacy web applications. In CCS'11.
    • CCS'11
    • Saxena, P.1    Molnar, D.2    Livshits, B.3
  • 27
    • 85076454876 scopus 로고    scopus 로고
    • Static detection of access control vulnerabilities in web applications
    • F. Sun, L. Xu and Z. Su. Static Detection of Access Control Vulnerabilities in Web Applications. In USENIX Security 2011.
    • (2011) USENIX Securit
    • Sun, F.1    Xu, L.2    Su, Z.3
  • 28
    • 80051944491 scopus 로고    scopus 로고
    • Path-and index-sensitive string analysis based on monadic second-order logic
    • T. Tateishi, M. Pistoia and O. Tripp. Path-and index-sensitive string analysis based on monadic second-order logic. In ISSTA'11
    • ISSTA'11
    • Tateishi, T.1    Pistoia, M.2    Tripp, O.3
  • 31
    • 35449004893 scopus 로고    scopus 로고
    • Sound and precise analysis of web applications for injection vulnerabilities
    • G. Wassermann and Z. Su. Sound and Precise Analysis of Web Applications for Injection Vulnerabilities. In PLDI'07.
    • PLDI'07
    • Wassermann, G.1    Su, Z.2
  • 32
    • 34249879570 scopus 로고    scopus 로고
    • Saturn: A scalable framework for error detection using Boolean satisfiability
    • May
    • Y. Xie and A. Aiken. Saturn: A scalable framework for error detection using Boolean satisfiability. In ACM Trans. Program. Lang. Syst. May, 2007.
    • (2007) ACM Trans. Program. Lang. Syst
    • Xie, Y.1    Aiken, A.2
  • 33
    • 79959887208 scopus 로고    scopus 로고
    • Patching vulnerabilities with sanitization synthesis
    • F. Yu, M. Alkhalaf and T. Bultan. Patching Vulnerabilities with Sanitization Synthesis. In ICSE'11.
    • ICSE'11
    • Yu, F.1    Alkhalaf, M.2    Bultan, T.3
  • 34
    • 84886432254 scopus 로고    scopus 로고
    • String abstractions for string verification
    • F. Yu, T. Bultan and B. Hardekopf. String Abstractions for String Verification. In SPIN'11.
    • SPIN'11
    • Yu, F.1    Bultan, T.2    Hardekopf, B.3
  • 35
    • 84864258272 scopus 로고    scopus 로고
    • Static detection of resource contention problems in server-side scripts
    • Y. Zheng and X. Zhang. Static Detection of Resource Contention Problems in Server-Side Scripts. In ICSE'12.
    • ICSE'12
    • Zheng, Y.1    Zhang, X.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.