-
1
-
-
85206057438
-
-
MySpace. 2005. MySpace Samy Worm. http://namb.la/popular/tech.html.
-
(2005)
MySpace Samy Worm
-
-
-
3
-
-
50249115131
-
Saner: Composing static and dynamic analysis to validate sanitization in web applications
-
Davide Balzarotti, Marco Cova, Vika Felmetsger, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, and Giovanni Vigna. 2008. Saner: Composing static and dynamic analysis to validate sanitization in web applications. In Oakland'08: Proceedings of the 29th IEEE Symposium on Security and Privacy. 387-401.
-
(2008)
Oakland'08: Proceedings of the 29th IEEE Symposium on Security and Privacy
, pp. 387-401
-
-
Balzarotti, D.1
Cova, M.2
Felmetsger, V.3
Jovanovic, N.4
Kirda, E.5
Kruegel, C.6
Vigna, G.7
-
18
-
-
41149124878
-
Secure web applications via automatic partitioning
-
Stephen Chong, Jed Liu, and rew C. Myers, Xin Qi, K. Vikram, Lantian Zheng, and Xin Zheng. 2007b. Secure web applications via automatic partitioning. In SOSP'07: Proceedings of the 21st ACM SIGOPS Symposium on Operating Systems Principles. 31-44.
-
(2007)
SOSP'07: Proceedings of the 21st ACM SIGOPS Symposium on Operating Systems Principles. 31-44
-
-
Chong, S.1
Liu, J.2
Myers, C.3
Qi, X.4
Vikram, K.5
Zheng, L.6
Zheng, X.7
-
21
-
-
51849162672
-
Vulnerability analysis of web applications
-
L. Baresi and E. Dinitto (Eds.). Springer
-
Marco Cova, Viktoria Felmetsger, and Giovanni Vigna. 2007b. Vulnerability analysis of web applications. In Testing and Analysis of Web Services, L. Baresi and E. Dinitto (Eds.). Springer.
-
(2007)
Testing and Analysis of Web Services
-
-
Cova, M.1
Felmetsger, V.2
Vigna, G.3
-
26
-
-
85206051052
-
-
Facebook. Facebook Bounty Program
-
Facebook. Facebook Bounty Program. https://www.facebook.com/whitehat.
-
-
-
-
28
-
-
79960257690
-
-
Harrison Fisk. 2004. Prepared Statements. http://en.wikipedia.org/wiki/ Prepared-statement.
-
(2004)
Prepared Statements
-
-
Fisk, H.1
-
31
-
-
85206043694
-
-
Gmail CSRF Security Flaw
-
Gmail CSRF Security Flaw. 2007. http://ajaxian.com/archives/gmail-csrf- security-flaw.
-
(2007)
-
-
-
32
-
-
85206056819
-
-
Google. Google Bounty Program
-
Google. Google Bounty Program. http://www.google.com/about/appsecurity/ reward-program/.
-
-
-
-
41
-
-
19944365247
-
Securing web application code by static analysis and runtime protection
-
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung Tsai, Der-Tsai Lee, and Sy-Yen Kuo. 2004. Securing web application code by static analysis and runtime protection. In WWW'04: Proceedings of the 13th International Conference on World Wide Web. 40-52.
-
(2004)
WWW'04: Proceedings of the 13th International Conference on World Wide Web
, pp. 40-52
-
-
Huang, Y.1
Yu, F.2
Hang, C.3
Tsai, C.4
Lee, D.5
Kuo, S.6
-
43
-
-
33846369107
-
Learning DFA representations of HTTP for protecting web applications
-
Kenneth L. Ingham, Anil Somayaji, John Burge, and Stephanie Forrest. 2007. Learning DFA representations of HTTP for protecting web applications. Computer Networks 51, 1239-1255.
-
(2007)
Computer Networks
, vol.51
, pp. 1239-1255
-
-
Ingham, K.L.1
Somayaji, A.2
Burge, J.3
Forrest, S.4
-
47
-
-
48349104683
-
RequestRodeo: Client-side protection against session riding
-
Martin Johns and Justus Winter. 2006. RequestRodeo: Client-side protection against session riding. In OWASP AppSec Europe.
-
(2006)
OWASP AppSec Europe
-
-
Johns, M.1
Winter, J.2
-
56
-
-
18844395404
-
Amulti-model approach to the detection of web-based attacks
-
August 2005
-
Christopher Kruegel, Giovanni Vigna, and William Robertson. 2005. Amulti-model approach to the detection of web-based attacks. Computer Networks 48, 5 (August 2005), 717-738.
-
(2005)
Computer Networks
, vol.48
, Issue.5
, pp. 717-738
-
-
Kruegel, C.1
Vigna, G.2
Robertson, W.3
-
64
-
-
34848813573
-
-
Gervase Markham. 2006. Content Restrictions. http://www.gerv.net/ security/content-restrictions/.
-
(2006)
Content Restrictions
-
-
-
73
-
-
84871349041
-
Automatically hardening web applications using precise tainting
-
Anh Nguyen-tuong, Salvatore Guarnieri, Doug Greene, Jeff Shirley, and David Evans. 2005. Automatically hardening web applications using precise tainting. In Proceedings of the 20th IFIP International Information Security Conference. 372-382.
-
(2005)
Proceedings of the 20th IFIP International Information Security Conference
, pp. 372-382
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Shirley, J.4
Evans, D.5
-
74
-
-
85206055890
-
-
NoScript. NoScript Features: Anti-XSS Protection
-
NoScript. NoScript Features: Anti-XSS Protection. http://noscript.net/.
-
-
-
-
79
-
-
85206064800
-
-
Rails. Ruby-on-Rails Security Guide
-
Rails. Ruby-on-Rails Security Guide. http://guides.rubyonrails.org/ security.html.
-
-
-
-
80
-
-
85076780225
-
BrowserShield: Vulnerability-driven filtering of dynamic HTML
-
Charles Reis, John Dunagan, Helen J. Wang, Opher Dubrovsky, and Saher Esmeir. 2006. BrowserShield: Vulnerability-driven filtering of dynamic HTML. In OSDI'06: Proceedings of the 7th Symposium on Operating Systems Design and Implementation. 61-74.
-
(2006)
OSDI'06: Proceedings of the 7th Symposium on Operating Systems Design and Implementation
, pp. 61-74
-
-
Reis, C.1
Dunagan, J.2
Wang, H.J.3
Dubrovsky, O.4
Esmeir, S.5
-
83
-
-
70449676927
-
-
David Ross. 2008. IE 8 XSS Filter Architecture. http://blogs.technet.com/ swi/archive/2008/08/19/ie-8-xss-filter-architecture-implementation.aspx.
-
(2008)
IE 8 XSS Filter Architecture
-
-
Ross, D.1
-
86
-
-
77955220343
-
A symbolic execution framework for javascript
-
Prateek Saxena, Devdatta Akhawe, Steve Hanna, Feng Mao, Stephen McCamant, and Dawn Song. 2010b. A Symbolic Execution Framework for JavaScript. In SP'10: Proceedings of the 2010 IEEE Symposium on Security and Privacy. 513-528.
-
(2010)
SP'10: Proceedings of the 2010 IEEE Symposium on Security and Privacy
, pp. 513-528
-
-
Saxena, P.1
Akhawe, D.2
Hanna, S.3
Mao, F.4
McCamant, S.5
Song, D.6
-
92
-
-
81455154871
-
RoleCast: Finding missing security checks when you do not know what checks are
-
Sooel Son, Kathryn S. McKinley, and Vitaly Shmatikov. 2011. RoleCast: Finding missing security checks when you do not know what checks are. In OOPSLA'11: Proceedings of the 26th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications. 1069-1084.
-
(2011)
OOPSLA'11: Proceedings of the 26th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications
, pp. 1069-1084
-
-
Son, S.1
McKinley, K.S.2
Shmatikov, V.3
-
103
-
-
77954608267
-
The multi-principal OS construction of the gazelle web browser
-
Helen J. Wang, Chris Grier, Alexander Moshchuk, Samuel T. King, Piali Choudhury, and Herman Venter. 2009. The multi-principal OS construction of the gazelle web browser. In USENIX'09: Proceedings of the 18th Conference on USENIX Security Symposium. 417-432.
-
(2009)
USENIX'09: Proceedings of the 18th Conference on USENIX Security Symposium
, pp. 417-432
-
-
Wang, H.J.1
Grier, C.2
Moshchuk, A.3
King, S.T.4
Choudhury, P.5
Venter, H.6
-
108
-
-
80053073233
-
A systematic analysis of XSS sanitization in web application frameworks
-
Joel Weinberger, Prateek Saxena, Devdatta Akhawe,Matthew Finifter, Richard Shin, and Dawn Song. 2011. A systematic analysis of XSS sanitization in web application frameworks. In ESORICS'11: Proceedings of the 16th European Symposium on Research in Computer Security.
-
(2011)
ESORICS'11: Proceedings of the 16th European Symposium on Research in Computer Security
-
-
Weinberger, J.1
Saxena, P.2
Akhawe, D.3
Finifter, M.4
Shin, R.5
Song, D.6
|