메뉴 건너뛰기




Volumn , Issue , 2013, Pages 642-651

Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis

Author keywords

Defect prediction; empirical study; input validation and sanitization; static and dynamic analysis; vulnerability

Indexed keywords

DEFECT PREDICTION; EMPIRICAL STUDIES; SANITIZATION; STATIC AND DYNAMIC ANALYSIS; VULNERABILITY;

EID: 84886430853     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSE.2013.6606610     Document Type: Conference Paper
Times cited : (100)

References (29)
  • 2
    • 84864239564 scopus 로고    scopus 로고
    • Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities
    • L. K. Shar and H. B. K. Tan, "Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities," in International Conference on Software Engineering, 2012, pp. 1293-1296.
    • (2012) International Conference on Software Engineering , pp. 1293-1293
    • Shar, L.K.1    Tan, H.B.K.2
  • 3
    • 33751027156 scopus 로고    scopus 로고
    • Pixy: A static analysis tool for detecting web application vulnerabilities
    • N. Jovanovic, C. Kruegel, and E. Kirda, "Pixy: a static analysis tool for detecting web application vulnerabilities," in IEEE Symposium on Security and Privacy, 2006, pp. 258-263.
    • (2006) IEEE Symposium on Security and Privacy , pp. 258-258
    • Jovanovic, N.1    Kruegel, C.2    Kirda, E.3
  • 4
    • 84910681237 scopus 로고    scopus 로고
    • Static detection of security vulnerabilities in scripting languages
    • Y. Xie and A. Aiken, "Static detection of security vulnerabilities in scripting languages," in USENIX Security Symposium, 2006, pp. 179-192.
    • (2006) USENIX Security Symposium , pp. 179-179
    • Xie, Y.1    Aiken, A.2
  • 5
    • 84886397466 scopus 로고    scopus 로고
    • accessed March
    • SourceForge. http://www.sourceforge.net, accessed March 2012.
    • (2012)
  • 6
    • 84886380945 scopus 로고    scopus 로고
    • accessed March
    • CVE. http://cve.mitre.org, accessed March 2012.
    • (2012)
  • 7
    • 84886421900 scopus 로고    scopus 로고
    • PhpMiner
    • PhpMiner. http://sharlwinkhin.com/phpminer.html.
  • 10
    • 84886416015 scopus 로고    scopus 로고
    • accessed March
    • RSnake. http://ha.ckers.org, accessed March 2012.
    • (2012)
  • 11
    • 50249115131 scopus 로고    scopus 로고
    • Saner: Composing static and dynamic analysis to validate sanitization in web applications
    • D. Balzarotti et al., "Saner: composing static and dynamic analysis to validate sanitization in web applications," in IEEE Symposium on Security and Privacy, 2008, pp. 387-401.
    • (2008) IEEE Symposium on Security and Privacy , pp. 387-387
    • Balzarotti, D.1
  • 12
    • 0343280011 scopus 로고    scopus 로고
    • Exploring the relationships between design measures and software quality in object-oriented systems
    • L. C. Briand, J. Wüst, J. W. Daly, and D. V. Porter, "Exploring the relationships between design measures and software quality in object-oriented systems," Journal of Systems and Software, vol. 51 (3), pp. 245-273, 2000.
    • (2000) Journal of Systems and Software , vol.51 , Issue.3 , pp. 245-273
    • Briand, L.C.1    Wüst, J.2    Daly, J.W.3    Porter, D.V.4
  • 13
    • 71649110371 scopus 로고    scopus 로고
    • A systematic and comprehensive investigation of methods to build and evaluate fault prediction models
    • E. Arisholm, L. C. Briand, and E. B. Johannessen, "A systematic and comprehensive investigation of methods to build and evaluate fault prediction models," Journal of Systems and Software, vol. 83 (1), pp. 2-17. 2010.
    • (2010) Journal of Systems and Software , vol.83 , Issue.1 , pp. 2-17
    • Arisholm, E.1    Briand, L.C.2    Johannessen, E.B.3
  • 14
    • 49349089233 scopus 로고    scopus 로고
    • Benchmarking classification models for software defect prediction: A proposed framework and novel findings
    • S. Lessmann, B. Baesens, C. Mues, and S. Pietsch, "Benchmarking classification models for software defect prediction: a proposed framework and novel findings," IEEE Transactions on Software Engineering, vol. 34 (4), pp. 485-496, 2008.
    • (2008) IEEE Transactions on Software Engineering , vol.34 , Issue.4 , pp. 485-496
    • Lessmann, S.1    Baesens, B.2    Mues, C.3    Pietsch, S.4
  • 15
    • 77956972220 scopus 로고    scopus 로고
    • Defect prediction from static code features: Current results, limitations, new approaches
    • T. Menzies, Z. Milton, B. Turhan, B. Cukic, Y. Jiang, and A. Bener, "Defect prediction from static code features: current results, limitations, new approaches," Automated Software Engineering, vol. 17 (4), pp. 375-407, 2010.
    • (2010) Automated Software Engineering , vol.17 , Issue.4 , pp. 375-407
    • Menzies, T.1    Milton, Z.2    Turhan, B.3    Cukic, B.4    Jiang, Y.5    Bener, A.6
  • 16
    • 84866920422 scopus 로고    scopus 로고
    • Predicting common web application vulnerabilities from input validation and sanitization code patterns
    • L. K. Shar and H. B. K. Tan, "Predicting common web application vulnerabilities from input validation and sanitization code patterns," in IEEE/ACM International Conference on Automated Software Engineering, 2012, pp. 310-313.
    • (2012) IEEE/ACM International Conference on Automated Software Engineering , pp. 310-310
    • Shar, L.K.1    Tan, H.B.K.2
  • 20
    • 29644438050 scopus 로고    scopus 로고
    • Statistical comparisons of classifiers over multiple data sets
    • J. DemŠar, "Statistical comparisons of classifiers over multiple data sets," Journal of Machine Learning Research, vol. 7, pp. 1-30, 2006.
    • (2006) Journal of Machine Learning Research , vol.7 , pp. 1-30
    • Demšar, J.1
  • 22
    • 85084163766 scopus 로고    scopus 로고
    • Automatic generation of XSS and SQL injection attacks with goal-directed model checking
    • M. Martin and M. S. Lam, "Automatic generation of XSS and SQL injection attacks with goal-directed model checking," in USENIX Security Symposium, 2008, pp. 31-43.
    • (2008) USENIX Security Symposium , pp. 31-31
    • Martin, M.1    Lam, M.S.2
  • 23
    • 83555172467 scopus 로고    scopus 로고
    • Evaluating complexity, code churn, and developer activity metrics as indicators of software vulnerabilities
    • Y. Shin, A. Meneely, L. Williams, and J. A. Osborne, "Evaluating complexity, code churn, and developer activity metrics as indicators of software vulnerabilities," IEEE Transactions on Software Engineering, vol. 37 (6), pp. 772-787, 2011.
    • (2011) IEEE Transactions on Software Engineering , vol.37 , Issue.6 , pp. 772-787
    • Shin, Y.1    Meneely, A.2    Williams, L.3    Osborne, J.A.4
  • 29
    • 84855479474 scopus 로고    scopus 로고
    • Automated removal of cross site scripting vulnerabilities in web applications
    • L. K. Shar and H. B. K. Tan, "Automated removal of cross site scripting vulnerabilities in web applications," Information and Software Technology, vol. 54 (5), pp. 467-478, 2012.
    • (2012) Information and Software Technology , vol.54 , Issue.5 , pp. 467-478
    • Shar, L.K.1    Tan, H.B.K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.