-
3
-
-
50249115131
-
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications
-
BALZAROTTI, D., COVA, M., FELMETSGER, V., JOVANOVIC, N., KIRDA, E., KRUEGEL, C., AND VIGNA, G. Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, CA, 2008).
-
Proceedings of the IEEE Symposium on Security and Privacy (Oakland, CA, 2008)
-
-
Balzarotti, D.1
Cova, M.2
Felmetsger, V.3
Jovanovic, N.4
Kirda, E.5
Kruegel, C.6
Vigna, G.7
-
6
-
-
84889020703
-
-
BlogSA.NET. http://www.blogsa.net/, 2013.
-
(2013)
-
-
-
10
-
-
84893378444
-
Tracking Rootkit Footprints with a Practical Memory Analysis System
-
CUI, W., PEINADO, M., XU, Z., AND CHAN, E. Tracking Rootkit Footprints with a Practical Memory Analysis System. In Proceedings of the USENIX Security Symposium (USENIX) (Bellevue, WA, 2012).
-
Proceedings of the USENIX Security Symposium (USENIX) (Bellevue, WA, 2012)
-
-
Cui, W.1
Peinado, M.2
Xu, Z.3
Chan, E.4
-
11
-
-
84889074262
-
-
CVE DETAILS. Vulnerabilities by Type. http://www.cvedetails.com/ vulnerabilities-by-types.php, 2013.
-
(2013)
Vulnerabilities by Type
-
-
-
12
-
-
84888992246
-
-
Django. http://djangoproject.com, 2013.
-
(2013)
-
-
-
16
-
-
84869439440
-
Scriptless Attacks: Stealing the Pie Without Touching the Sill
-
HEIDERICH, M., NIEMIETZ, M., SCHUSTER, F., HOLZ, T., AND SCHWENK, J. Scriptless Attacks: Stealing the Pie Without Touching the Sill. In Proceedings of the ACM Conference on Computer and Communications Security (CCS) (2012).
-
Proceedings of the ACM Conference on Computer and Communications Security (CCS) (2012)
-
-
Heiderich, M.1
Niemietz, M.2
Schuster, F.3
Holz, T.4
Schwenk, J.5
-
17
-
-
84888994589
-
-
Hoff, J. WebGoat.NET. https://github.com/jerryhoff/WebGoat.NET, 2013.
-
(2013)
WebGoat.NET
-
-
Hoff, J.1
-
18
-
-
84970882954
-
Fast and Precise Sanitizer Analysis with Bek
-
HOOIMEIJER, P., LIVSHITS, B., MOLNAR, D., SAXENA, P., AND VEANES, M. Fast and Precise Sanitizer Analysis with Bek. In Proceedings of the USENIX Security Symposium (USENIX) (2011).
-
Proceedings of the USENIX Security Symposium (USENIX) (2011)
-
-
Hooimeijer, P.1
Livshits, B.2
Molnar, D.3
Saxena, P.4
Veanes, M.5
-
23
-
-
33751032654
-
Noxes: A Client-Side Solution for Mitigating Cross-Site Scripting Attacks
-
KIRDA, E., KRUEGEL, C., VIGNA, G., AND JOVANOVIC, N. Noxes: A Client-Side Solution for Mitigating Cross-Site Scripting Attacks. In Proceedings of the ACM Symposium on Applied Computing (SAC) (2006).
-
Proceedings of the ACM Symposium on Applied Computing (SAC) (2006)
-
-
Kirda, E.1
Kruegel, C.2
Vigna, G.3
Jovanovic, N.4
-
31
-
-
84889071362
-
-
MICROSOFT. ASP.NET
-
MICROSOFT. ASP.NET. http://www.asp.net/.
-
-
-
-
32
-
-
84889002704
-
-
MICROSOFT RESEARCH. Common Compiler Infrastructure. http://research. microsoft.com/en-us/projects/cci/, 2013.
-
(2013)
Common Compiler Infrastructure
-
-
-
34
-
-
84871349041
-
Automatically Hardening Web Applications Using Precise Tainting
-
NGUYEN-TUONG, A., GUARNIERI, S., GREENE, D., AND EVANS, D. Automatically Hardening Web Applications Using Precise Tainting. In Proceedings of the IFIP International Information Security Conference (2005).
-
Proceedings of the IFIP International Information Security Conference (2005)
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Evans, D.4
-
37
-
-
84888990914
-
-
Ruby on Rails. http://rubyonrails.org/, 2013.
-
(2013)
-
-
-
39
-
-
77955220343
-
A Symbolic Execution Framework for JavaScript
-
SAXENA, P., AKHAWE, D., HANNA, S., MAO, F., MCCAMANT, S., AND SONG, D. A Symbolic Execution Framework for JavaScript. In Proceedings of the IEEE Symposium on Security and Privacy (2010).
-
Proceedings of the IEEE Symposium on Security and Privacy (2010)
-
-
Saxena, P.1
Akhawe, D.2
Hanna, S.3
Mao, F.4
Mccamant, S.5
Song, D.6
-
41
-
-
84889036153
-
-
ScrewTurn Wiki
-
ScrewTurn Wiki. http://www.screwturn.eu/, 2013.
-
(2013)
-
-
-
44
-
-
70450242742
-
TAJ: Effective Taint Analysis of Web Applications
-
TRIPP, O., PISTOIA, M., FINK, S. J., SRIDHARAN, M., AND WEISMAN, O. TAJ: Effective Taint Analysis of Web Applications. In Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI) (2009).
-
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI) (2009)
-
-
Tripp, O.1
Pistoia, M.2
Fink, S.J.3
Sridharan, M.4
Weisman, O.5
-
45
-
-
84887309913
-
Cross-Site Scripting Prevention with Dynamic Data Tainting and Static Analysis
-
VOGT, P., NENTWICH, F., JOVANOVIC, N., KIRDA, E., KRUEGEL, C., AND VIGNA, G. Cross-Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. In Proceeding of the Network and Distributed System Security Symposium (NDSS) (2007).
-
Proceeding of the Network and Distributed System Security Symposium (NDSS) (2007)
-
-
Vogt, P.1
Nentwich, F.2
Jovanovic, N.3
Kirda, E.4
Kruegel, C.5
Vigna, G.6
-
48
-
-
80053073233
-
A Systematic Analysis of XSS Sanitization in Web Application Frameworks
-
WEINBERGER, J., SAXENA, P., AKHAWE, D., FINIFTER, M., SHIN, R., AND SONG, D. A Systematic Analysis of XSS Sanitization in Web Application Frameworks. In Proceedings of the European Symposium on Research in Computer Security (ESORICS) (Leuven, Belgium, 2011).
-
Proceedings of the European Symposium on Research in Computer Security (ESORICS) (Leuven, Belgium, 2011)
-
-
Weinberger, J.1
Saxena, P.2
Akhawe, D.3
Finifter, M.4
Shin, R.5
Song, D.6
|