메뉴 건너뛰기




Volumn , Issue , 2013, Pages 329-338

SilverLine: Preventing data leaks from compromised web applications

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION DATA; APPLICATION SERVERS; AUTHORIZED USERS; DATABASE RECORDS; INFORMATION FLOWS; SENSITIVE DATAS; WEB APPLICATION; WEB APPLICATION ATTACKS;

EID: 84893274038     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2523649.2523663     Document Type: Conference Paper
Times cited : (6)

References (41)
  • 1
    • 84893253669 scopus 로고    scopus 로고
    • Amazon Relational Database Service. http://aws.amazon.com/rds/.
  • 2
    • 84893326200 scopus 로고    scopus 로고
    • Attrition.net
    • Attrition.net. Absolute Sownage. http://attrition.org/security/rant/sony- aka-sownage.html, 2011.
    • (2011) Absolute Sownage
  • 6
    • 84894039463 scopus 로고    scopus 로고
    • Nemesis: Preventing authentication & access control vulnerabilities in web applications
    • M. Dalton, N. Zeldovich, and C. Kozyrakis. Nemesis: Preventing authentication & access control vulnerabilities in web applications. In 18th Usenix Security Symposium, 2009.
    • (2009) 18th Usenix Security Symposium
    • Dalton, M.1    Zeldovich, N.2    Kozyrakis, C.3
  • 8
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • May
    • D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5): 236-243, May 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 9
    • 84893288206 scopus 로고    scopus 로고
    • L. Dignan. Sony's data breach costs. http://www.zdnet.com/blog/btl/sonys- data-breach-costs-likely-to-scream-higher49161, 2011.
    • (2011) Sony's Data Breach Costs
    • Dignan, L.1
  • 14
    • 84893335765 scopus 로고    scopus 로고
    • T. Inquirer. Citibank Hacked by altering URLs. http://www.theinquirer. net/inquirer/news/2079431/citibank-hacked-altering-urls, 2011.
    • (2011) Citibank Hacked by Altering URLs
  • 15
    • 33947629208 scopus 로고    scopus 로고
    • Provenance-aware tracing of worm break-in and contaminations: A process coloring approach
    • June
    • X. Jiang, A. Walters, F. Buchholz, D. Xu, Y.-M. Wang, and E. H. Spafford. Provenance-Aware Tracing of Worm Break-in and Contaminations: A Process Coloring Approach. In ICDCS, June 2006.
    • (2006) ICDCS
    • Jiang, X.1    Walters, A.2    Buchholz, F.3    Xu, D.4    Wang, Y.-M.5    Spafford, E.H.6
  • 21
    • 84881361956 scopus 로고    scopus 로고
    • MySQL Proxy. http://forge.mysql.com/wiki/MySQL-Proxy.
    • MySQL Proxy
  • 22
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • San Diego, CA
    • J. Newsome and D. X. Song. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, 2005.
    • (2005) Proceedings of the Network and Distributed System Security Symposium (NDSS)
    • Newsome, J.1    Song, D.X.2
  • 23
    • 84893288954 scopus 로고    scopus 로고
    • OpenFlow Switch Consortium. http://www.openflowswitch.org/, 2008.
    • (2008)
  • 31
    • 84893287530 scopus 로고    scopus 로고
    • Redis. http://redis.io/.
  • 32
    • 84893338234 scopus 로고    scopus 로고
    • Redis Benchmarks. https://code.google.com/p/redis/wiki/Benchmarks.
    • Redis Benchmarks
  • 40
    • 85094632142 scopus 로고    scopus 로고
    • Securing distributed systems with information flow control
    • San Francisco, CA, Apr.
    • N. Zeldovich, S. Boyd-Wickizer, and D. Mazieres. Securing Distributed Systems with Information Flow Control. In Proc. 5th USENIX NSDI, San Francisco, CA, Apr. 2008.
    • (2008) Proc. 5th USENIX NSDI
    • Zeldovich, N.1    Boyd-Wickizer, S.2    Mazieres, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.