메뉴 건너뛰기




Volumn , Issue , 2010, Pages 143-160

Toward automated detection of logic vulnerabilities in web applications

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION PROGRAMS; KNOWLEDGE MANAGEMENT; MODEL CHECKING; NETWORK SECURITY; SPECIFICATIONS;

EID: 84894088425     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (118)

References (36)
  • 10
    • 0036041420 scopus 로고    scopus 로고
    • Bugs as deviant behavior: A general approach to inferring errors in systems code
    • ENGLER, D., CHEN, D., HALLEM, S., CHOU, A., AND CHELF, B. Bugs as deviant behavior: a general approach to inferring errors in systems code. ACM SIGOPS Operating Systems Review 35, 5 (2001), 57–72.
    • (2001) ACM SIGOPS Operating Systems Review , vol.35 , Issue.5 , pp. 57-72
    • Engler, D.1    Chen, D.2    Hallem, S.3    Chou, A.4    Chelf, B.5
  • 13
    • 63849251457 scopus 로고    scopus 로고
    • FOUNDATION, T. A. S. Apache Tomcat. http://tomcat.apache.org/.
    • Apache Tomcat
  • 19
    • 84874410958 scopus 로고    scopus 로고
    • Java pathfinder. http://javapathfinder.sourceforge.net/.
    • Java Pathfinder
  • 22
    • 84923564816 scopus 로고    scopus 로고
    • Finding security vulnerabilities in Java applications with static analysis
    • August
    • LIVSHITS, V., AND LAM, M. Finding Security Vulnerabilities in Java Applications with Static Analysis. In Proceedings of the USENIX Security Symposium (August 2005), pp. 271–286.
    • (2005) Proceedings of the USENIX Security Symposium , pp. 271-286
    • Livshits, V.1    Lam, M.2
  • 23
    • 85084163766 scopus 로고    scopus 로고
    • Automatic generation of XSS and SQL injection attacks with goal-directed model checking
    • July
    • MARTIN, M., AND LAM, M. Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking. In Proceedings of the USENIX Security Symposium (July 2008), pp. 31–43.
    • (2008) Proceedings of the USENIX Security Symposium , pp. 31-43
    • Martin, M.1    Lam, M.2
  • 25
    • 85076265053 scopus 로고    scopus 로고
    • MI D D L E WA R E, O. W. O. S. ASM. http://asm.objectweb.org/.
  • 28
    • 35348898067 scopus 로고    scopus 로고
    • OP E N SO U R C E SO F T WA R E. SourceForge. http://sourceforge.net.
    • SourceForge
  • 34
    • 84894034704 scopus 로고    scopus 로고
    • Autoises: Automatically inferring security specifications and detecting violations
    • July
    • TAN, L., ZHANG, X., MA, X., XIONG, W., AND ZHOU, Y. AutoISES: Automatically Inferring Security Specifications and Detecting Violations. In Proceedings of the USENIX Security Symposium (July 2008), pp. 379–394.
    • (2008) Proceedings of the USENIX Security Symposium , pp. 379-394
    • Tan, L.1    Zhang, X.2    Ma, X.3    Xiong, W.4    Zhou, Y.5
  • 36
    • 84910681237 scopus 로고    scopus 로고
    • Static detection of security vulnerabilities in scripting languages
    • August
    • XIE, Y., AND AIKEN, A. Static Detection of Security Vulnerabilities in Scripting Languages. In Proceedings of the USENIX Security Symposium (August 2006).
    • (2006) Proceedings of the USENIX Security Symposium
    • Xie, Y.1    Aiken, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.