-
2
-
-
84864239564
-
Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities
-
L. K. Shar and H. B. K. Tan, "Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities," in International Conference on Software Engineering, 2012, pp. 1293-1296.
-
(2012)
International Conference on Software Engineering
, pp. 1293-1293
-
-
Shar, L.K.1
Tan, H.B.K.2
-
3
-
-
33751027156
-
Pixy: A static analysis tool for detecting web application vulnerabilities
-
N. Jovanovic, C. Kruegel, and E. Kirda, "Pixy: a static analysis tool for detecting web application vulnerabilities," in IEEE Symposium on Security and Privacy, 2006, pp. 258-263.
-
(2006)
IEEE Symposium on Security and Privacy
, pp. 258-258
-
-
Jovanovic, N.1
Kruegel, C.2
Kirda, E.3
-
4
-
-
84910681237
-
Static detection of security vulnerabilities in scripting languages
-
Y. Xie and A. Aiken, "Static detection of security vulnerabilities in scripting languages," in USENIX Security Symposium, 2006, pp. 179-192.
-
(2006)
USENIX Security Symposium
, pp. 179-179
-
-
Xie, Y.1
Aiken, A.2
-
5
-
-
84886397466
-
-
accessed March
-
SourceForge. http://www.sourceforge.net, accessed March 2012.
-
(2012)
-
-
-
6
-
-
84886380945
-
-
accessed March
-
CVE. http://cve.mitre.org, accessed March 2012.
-
(2012)
-
-
-
7
-
-
84886421900
-
-
PhpMiner
-
PhpMiner. http://sharlwinkhin.com/phpminer.html.
-
-
-
-
8
-
-
0023385308
-
The program dependence graph and its use in optimization
-
J. Ferrante, K. J. Ottenstein, and J. D. Warren, "The program dependence graph and its use in optimization," ACM Transactions on Programming Languages and Systems, vol. 9, pp. 319-349, 1987.
-
(1987)
ACM Transactions on Programming Languages and Systems
, vol.9
, pp. 319-349
-
-
Ferrante, J.1
Ottenstein, K.J.2
Warren, J.D.3
-
10
-
-
84886416015
-
-
accessed March
-
RSnake. http://ha.ckers.org, accessed March 2012.
-
(2012)
-
-
-
11
-
-
50249115131
-
Saner: Composing static and dynamic analysis to validate sanitization in web applications
-
D. Balzarotti et al., "Saner: composing static and dynamic analysis to validate sanitization in web applications," in IEEE Symposium on Security and Privacy, 2008, pp. 387-401.
-
(2008)
IEEE Symposium on Security and Privacy
, pp. 387-387
-
-
Balzarotti, D.1
-
12
-
-
0343280011
-
Exploring the relationships between design measures and software quality in object-oriented systems
-
L. C. Briand, J. Wüst, J. W. Daly, and D. V. Porter, "Exploring the relationships between design measures and software quality in object-oriented systems," Journal of Systems and Software, vol. 51 (3), pp. 245-273, 2000.
-
(2000)
Journal of Systems and Software
, vol.51
, Issue.3
, pp. 245-273
-
-
Briand, L.C.1
Wüst, J.2
Daly, J.W.3
Porter, D.V.4
-
13
-
-
71649110371
-
A systematic and comprehensive investigation of methods to build and evaluate fault prediction models
-
E. Arisholm, L. C. Briand, and E. B. Johannessen, "A systematic and comprehensive investigation of methods to build and evaluate fault prediction models," Journal of Systems and Software, vol. 83 (1), pp. 2-17. 2010.
-
(2010)
Journal of Systems and Software
, vol.83
, Issue.1
, pp. 2-17
-
-
Arisholm, E.1
Briand, L.C.2
Johannessen, E.B.3
-
14
-
-
49349089233
-
Benchmarking classification models for software defect prediction: A proposed framework and novel findings
-
S. Lessmann, B. Baesens, C. Mues, and S. Pietsch, "Benchmarking classification models for software defect prediction: a proposed framework and novel findings," IEEE Transactions on Software Engineering, vol. 34 (4), pp. 485-496, 2008.
-
(2008)
IEEE Transactions on Software Engineering
, vol.34
, Issue.4
, pp. 485-496
-
-
Lessmann, S.1
Baesens, B.2
Mues, C.3
Pietsch, S.4
-
15
-
-
77956972220
-
Defect prediction from static code features: Current results, limitations, new approaches
-
T. Menzies, Z. Milton, B. Turhan, B. Cukic, Y. Jiang, and A. Bener, "Defect prediction from static code features: current results, limitations, new approaches," Automated Software Engineering, vol. 17 (4), pp. 375-407, 2010.
-
(2010)
Automated Software Engineering
, vol.17
, Issue.4
, pp. 375-407
-
-
Menzies, T.1
Milton, Z.2
Turhan, B.3
Cukic, B.4
Jiang, Y.5
Bener, A.6
-
16
-
-
84866920422
-
Predicting common web application vulnerabilities from input validation and sanitization code patterns
-
L. K. Shar and H. B. K. Tan, "Predicting common web application vulnerabilities from input validation and sanitization code patterns," in IEEE/ACM International Conference on Automated Software Engineering, 2012, pp. 310-313.
-
(2012)
IEEE/ACM International Conference on Automated Software Engineering
, pp. 310-310
-
-
Shar, L.K.1
Tan, H.B.K.2
-
18
-
-
76649099221
-
Combining naive-bayesian classifier and genetic clustering for effective anomaly based intrusion detection
-
S. Thamaraiselvi, R. Srivathsan, J. Imayavendhan, R. Muthuregunathan, and S. Siddharth, "Combining naive-bayesian classifier and genetic clustering for effective anomaly based intrusion detection," Lecture Notes in Computer Science, vol. 5908, pp. 455-462, 2009.
-
(2009)
Lecture Notes in Computer Science
, vol.5908
, pp. 455-462
-
-
Thamaraiselvi, S.1
Srivathsan, R.2
Imayavendhan, J.3
Muthuregunathan, R.4
Siddharth, S.5
-
20
-
-
29644438050
-
Statistical comparisons of classifiers over multiple data sets
-
J. DemŠar, "Statistical comparisons of classifiers over multiple data sets," Journal of Machine Learning Research, vol. 7, pp. 1-30, 2006.
-
(2006)
Journal of Machine Learning Research
, vol.7
, pp. 1-30
-
-
Demšar, J.1
-
21
-
-
77949879017
-
Automatic creation of SQL injection and cross-site scripting attacks
-
A. Kie?un, P. J. Guo, K. Jayaraman, and M. D. Ernst, "Automatic creation of SQL injection and cross-site scripting attacks," in International Conference on Software Engineering, 2009, pp. 199-209.
-
(2009)
International Conference on Software Engineering
, pp. 199-199
-
-
Kieun, A.1
Guo, P.J.2
Jayaraman, K.3
Ernst, M.D.4
-
22
-
-
85084163766
-
Automatic generation of XSS and SQL injection attacks with goal-directed model checking
-
M. Martin and M. S. Lam, "Automatic generation of XSS and SQL injection attacks with goal-directed model checking," in USENIX Security Symposium, 2008, pp. 31-43.
-
(2008)
USENIX Security Symposium
, pp. 31-31
-
-
Martin, M.1
Lam, M.S.2
-
23
-
-
83555172467
-
Evaluating complexity, code churn, and developer activity metrics as indicators of software vulnerabilities
-
Y. Shin, A. Meneely, L. Williams, and J. A. Osborne, "Evaluating complexity, code churn, and developer activity metrics as indicators of software vulnerabilities," IEEE Transactions on Software Engineering, vol. 37 (6), pp. 772-787, 2011.
-
(2011)
IEEE Transactions on Software Engineering
, vol.37
, Issue.6
, pp. 772-787
-
-
Shin, Y.1
Meneely, A.2
Williams, L.3
Osborne, J.A.4
-
24
-
-
72449154095
-
Security of open source web applications
-
J. Walden, M. Doyle, G. A. Welch, and M. Whelan, "Security of open source web applications," in International Symposium on Empirical Software Engineering and Measurement, 2009, pp. 545-553.
-
(2009)
International Symposium on Empirical Software Engineering and Measurement
, pp. 545-545
-
-
Walden, J.1
Doyle, M.2
Welch, G.A.3
Whelan, M.4
-
25
-
-
34547700305
-
Using historical inprocess and product metrics for early estimation of software failures
-
N. Nagappan, T. Ball, and B. Murphy, "Using historical inprocess and product metrics for early estimation of software failures," in International Symposium on Software Reliability Engineering, 2006, pp. 62-74.
-
(2006)
International Symposium on Software Reliability Engineering
, pp. 62-62
-
-
Nagappan, N.1
Ball, T.2
Murphy, B.3
-
26
-
-
67249126825
-
Predicting vulnerable software components
-
S. Neuhaus, T. Zimmermann, C. Holler, and A. Zeller, "Predicting vulnerable software components," in ACM Conference on Computer and Communications Security, 2007, pp. 529-540.
-
(2007)
ACM Conference on Computer and Communications Security
, pp. 529-529
-
-
Neuhaus, S.1
Zimmermann, T.2
Holler, C.3
Zeller, A.4
-
29
-
-
84855479474
-
Automated removal of cross site scripting vulnerabilities in web applications
-
L. K. Shar and H. B. K. Tan, "Automated removal of cross site scripting vulnerabilities in web applications," Information and Software Technology, vol. 54 (5), pp. 467-478, 2012.
-
(2012)
Information and Software Technology
, vol.54
, Issue.5
, pp. 467-478
-
-
Shar, L.K.1
Tan, H.B.K.2
|