-
1
-
-
0036038253
-
Mining specifications
-
AMMONS, G., BODÍK, R., AND LARUS, J. Mining specifications. In Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages (2002), ACM, pp. 4–16.
-
(2002)
Proceedings of the 29th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 4-16
-
-
Ammons, G.1
Bodík, R.2
Larus, J.3
-
4
-
-
60649106745
-
Automatic inference and enforcement of kernel data structure invariants
-
BALIGA, A., GANAPATHY, V., AND IFTODE, L. Automatic Inference and Enforcement of Kernel Data Structure Invariants. In Computer Security Applications Conference, 2008. ACSAC 2008. Annual (2008), pp. 77–86.
-
(2008)
Computer Security Applications Conference, 2008. ACSAC 2008. Annual
, pp. 77-86
-
-
Baliga, A.1
Ganapathy, V.2
Iftode, L.3
-
5
-
-
49949096891
-
Multi-module Vulnerability Analysis of Web-based Applications
-
BALZAROTTI, D., COVA, M., FELMETSGER, V., AND VIGNA, G. Multi-module Vulnerability Analysis of Web-based Applications. In Proceedings of the ACM conference on Computer and Communications Security (CCS) (2007), pp. 25–35.
-
(2007)
Proceedings of the ACM Conference on Computer and Communications Security (CCS)
, pp. 25-35
-
-
Balzarotti, D.1
Cova, M.2
Felmetsger, V.3
Vigna, G.4
-
6
-
-
77954706411
-
-
Tech. Rep. TR-09-14, UT Austin Computer Sciences
-
BOND, M., SRIVASTAVA, V., MCKINLEY, K., AND SHMATIKOV, V. Efficient, Context-Sensitive Detection of Semantic Attacks. Tech. Rep. TR-09-14, UT Austin Computer Sciences, 2009.
-
(2009)
Efficient, Context-Sensitive Detection of Semantic Attacks
-
-
Bond, M.1
Srivastava, V.2
McKinley, K.3
Shmatikov, V.4
-
7
-
-
38149011298
-
Swaddler: An Approach for the Anomaly-based Detection of State Violations in Web Applications
-
COVA, M., BALZAROTTI, D., FELMETSGER, V., AND VIGNA, G. Swaddler: An Approach for the Anomaly-based Detection of State Violations in Web Applications. In Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID) (2007), pp. 63–86.
-
(2007)
Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID)
, pp. 63-86
-
-
Cova, M.1
Balzarotti, D.2
Felmetsger, V.3
Vigna, G.4
-
10
-
-
0036041420
-
Bugs as deviant behavior: A general approach to inferring errors in systems code
-
ENGLER, D., CHEN, D., HALLEM, S., CHOU, A., AND CHELF, B. Bugs as deviant behavior: a general approach to inferring errors in systems code. ACM SIGOPS Operating Systems Review 35, 5 (2001), 57–72.
-
(2001)
ACM SIGOPS Operating Systems Review
, vol.35
, Issue.5
, pp. 57-72
-
-
Engler, D.1
Chen, D.2
Hallem, S.3
Chou, A.4
Chelf, B.5
-
11
-
-
35348872682
-
The daikon system for dynamic detection of likely invariants
-
Dec
-
ERNST, M., PERKINS, J., GUO, P., MCCAMANT, S., PACHECO, C., TSCHANTZ, M., AND XIAO, C. The Daikon System for Dynamic Detection of Likely Invariants. Science of Computer Programming 69, 1–3 (Dec. 2007), 35–45.
-
(2007)
Science of Computer Programming
, vol.69
, Issue.1-3
, pp. 35-45
-
-
Ernst, M.1
Perkins, J.2
Guo, P.3
McCamant, S.4
Pacheco, C.5
Tschantz, M.6
Xiao, C.7
-
13
-
-
63849251457
-
-
FOUNDATION, T. A. S. Apache Tomcat. http://tomcat.apache.org/.
-
Apache Tomcat
-
-
-
15
-
-
84865621386
-
Using static analysis for Ajax intrusion detection
-
ACM New York, NY, USA
-
GUHA, A., KRISHNAMURTHI, S., AND JIM, T. Using static analysis for Ajax intrusion detection. In Proceedings of the 18th international conference on World wide web (2009), ACM New York, NY, USA, pp. 561–570.
-
(2009)
Proceedings of the 18th International Conference on World Wide Web
, pp. 561-570
-
-
Guha, A.1
Krishnamurthi, S.2
Jim, T.3
-
17
-
-
19944365247
-
Securing web application code by static analysis and runtime protection
-
May
-
HUANG, Y.-W., YU, F., HANG, C., TSAI, C.-H., LEE, D., AND KUO, S.-Y. Securing Web Application Code by Static Analysis and Runtime Protection. In Proceedings of the International World Wide Web Conference (WWW) (May 2004), pp. 40–52.
-
(2004)
Proceedings of the International World Wide Web Conference (WWW)
, pp. 40-52
-
-
Huang, Y.-W.1
Yu, F.2
Hang, C.3
Tsai, C.-H.4
Lee, D.5
Kuo, S.-Y.6
-
19
-
-
84874410958
-
-
Java pathfinder. http://javapathfinder.sourceforge.net/.
-
Java Pathfinder
-
-
-
21
-
-
77949371828
-
From uncertainty to belief: Inferring the specification within
-
November
-
KREMENEK, T., TWOHEY, P., BACK, G., NG, A., AND ENGLER, D. From Uncertainty to Belief: Inferring the Specification Within. In Proceedings of the Symposium on Operating Systems Design and Implementation (OSDI) (November 2006), pp. 161–176.
-
(2006)
Proceedings of the Symposium on Operating Systems Design and Implementation (OSDI)
, pp. 161-176
-
-
Kremenek, T.1
Twohey, P.2
Back, G.3
Ng, A.4
Engler, D.5
-
22
-
-
84923564816
-
Finding security vulnerabilities in Java applications with static analysis
-
August
-
LIVSHITS, V., AND LAM, M. Finding Security Vulnerabilities in Java Applications with Static Analysis. In Proceedings of the USENIX Security Symposium (August 2005), pp. 271–286.
-
(2005)
Proceedings of the USENIX Security Symposium
, pp. 271-286
-
-
Livshits, V.1
Lam, M.2
-
23
-
-
85084163766
-
Automatic generation of XSS and SQL injection attacks with goal-directed model checking
-
July
-
MARTIN, M., AND LAM, M. Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking. In Proceedings of the USENIX Security Symposium (July 2008), pp. 31–43.
-
(2008)
Proceedings of the USENIX Security Symposium
, pp. 31-43
-
-
Martin, M.1
Lam, M.2
-
25
-
-
85076265053
-
-
MI D D L E WA R E, O. W. O. S. ASM. http://asm.objectweb.org/.
-
-
-
-
26
-
-
31744433386
-
Automatically hardening web applications using precise tainting
-
May
-
NGUYEN-TUONG, A., GUARNIERI, S., GREENE, D., AND EVANS, D. Automatically Hardening Web Applications Using Precise Tainting. In Proceedings of the International Information Security Conference (SEC) (May 2005), pp. 372–382.
-
(2005)
Proceedings of the International Information Security Conference (SEC)
, pp. 372-382
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Evans, D.4
-
28
-
-
35348898067
-
-
OP E N SO U R C E SO F T WA R E. SourceForge. http://sourceforge.net.
-
SourceForge
-
-
-
29
-
-
49949086078
-
On race vulnerabilities in web applications
-
July
-
PALEARI, R., MARRONE, D., BRUSCHI, D., AND MONGA, M. On race vulnerabilities in web applications. In Proceedings of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA) (July 2008).
-
(2008)
Proceedings of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)
-
-
Paleari, R.1
Marrone, D.2
Bruschi, D.3
Monga, M.4
-
34
-
-
84894034704
-
Autoises: Automatically inferring security specifications and detecting violations
-
July
-
TAN, L., ZHANG, X., MA, X., XIONG, W., AND ZHOU, Y. AutoISES: Automatically Inferring Security Specifications and Detecting Violations. In Proceedings of the USENIX Security Symposium (July 2008), pp. 379–394.
-
(2008)
Proceedings of the USENIX Security Symposium
, pp. 379-394
-
-
Tan, L.1
Zhang, X.2
Ma, X.3
Xiong, W.4
Zhou, Y.5
-
35
-
-
0037384036
-
Model checking programs
-
Apr
-
VISSER, W., HAVELUND, K., BRAT, G., PARK, S., AND LERDA, F. Model Checking Programs. Automated Software Engineering Journal 10, 2 (Apr. 2003).
-
(2003)
Automated Software Engineering Journal
, vol.10
, pp. 2
-
-
Visser, W.1
Havelund, K.2
Brat, G.3
Park, S.4
Lerda, F.5
-
36
-
-
84910681237
-
Static detection of security vulnerabilities in scripting languages
-
August
-
XIE, Y., AND AIKEN, A. Static Detection of Security Vulnerabilities in Scripting Languages. In Proceedings of the USENIX Security Symposium (August 2006).
-
(2006)
Proceedings of the USENIX Security Symposium
-
-
Xie, Y.1
Aiken, A.2
|