메뉴 건너뛰기




Volumn 46, Issue 4, 2013, Pages

A survey on server-side approaches to securing web applications

Author keywords

Application logic vulnerability; Input validation vulnerability; Session management vulnerability; Web application security

Indexed keywords

COMPUTER CIRCUITS; SECURITY OF DATA; WEB SERVICES;

EID: 84901229096     PISSN: 03600300     EISSN: 15577341     Source Type: Journal    
DOI: 10.1145/2541315     Document Type: Review
Times cited : (60)

References (112)
  • 1
    • 85206057438 scopus 로고    scopus 로고
    • MySpace. 2005. MySpace Samy Worm. http://namb.la/popular/tech.html.
    • (2005) MySpace Samy Worm
  • 21
    • 51849162672 scopus 로고    scopus 로고
    • Vulnerability analysis of web applications
    • L. Baresi and E. Dinitto (Eds.). Springer
    • Marco Cova, Viktoria Felmetsger, and Giovanni Vigna. 2007b. Vulnerability analysis of web applications. In Testing and Analysis of Web Services, L. Baresi and E. Dinitto (Eds.). Springer.
    • (2007) Testing and Analysis of Web Services
    • Cova, M.1    Felmetsger, V.2    Vigna, G.3
  • 26
    • 85206051052 scopus 로고    scopus 로고
    • Facebook. Facebook Bounty Program
    • Facebook. Facebook Bounty Program. https://www.facebook.com/whitehat.
  • 28
  • 31
    • 85206043694 scopus 로고    scopus 로고
    • Gmail CSRF Security Flaw
    • Gmail CSRF Security Flaw. 2007. http://ajaxian.com/archives/gmail-csrf- security-flaw.
    • (2007)
  • 32
    • 85206056819 scopus 로고    scopus 로고
    • Google. Google Bounty Program
    • Google. Google Bounty Program. http://www.google.com/about/appsecurity/ reward-program/.
  • 43
    • 33846369107 scopus 로고    scopus 로고
    • Learning DFA representations of HTTP for protecting web applications
    • Kenneth L. Ingham, Anil Somayaji, John Burge, and Stephanie Forrest. 2007. Learning DFA representations of HTTP for protecting web applications. Computer Networks 51, 1239-1255.
    • (2007) Computer Networks , vol.51 , pp. 1239-1255
    • Ingham, K.L.1    Somayaji, A.2    Burge, J.3    Forrest, S.4
  • 47
    • 48349104683 scopus 로고    scopus 로고
    • RequestRodeo: Client-side protection against session riding
    • Martin Johns and Justus Winter. 2006. RequestRodeo: Client-side protection against session riding. In OWASP AppSec Europe.
    • (2006) OWASP AppSec Europe
    • Johns, M.1    Winter, J.2
  • 56
    • 18844395404 scopus 로고    scopus 로고
    • Amulti-model approach to the detection of web-based attacks
    • August 2005
    • Christopher Kruegel, Giovanni Vigna, and William Robertson. 2005. Amulti-model approach to the detection of web-based attacks. Computer Networks 48, 5 (August 2005), 717-738.
    • (2005) Computer Networks , vol.48 , Issue.5 , pp. 717-738
    • Kruegel, C.1    Vigna, G.2    Robertson, W.3
  • 64
    • 34848813573 scopus 로고    scopus 로고
    • Gervase Markham. 2006. Content Restrictions. http://www.gerv.net/ security/content-restrictions/.
    • (2006) Content Restrictions
  • 74
    • 85206055890 scopus 로고    scopus 로고
    • NoScript. NoScript Features: Anti-XSS Protection
    • NoScript. NoScript Features: Anti-XSS Protection. http://noscript.net/.
  • 79
    • 85206064800 scopus 로고    scopus 로고
    • Rails. Ruby-on-Rails Security Guide
    • Rails. Ruby-on-Rails Security Guide. http://guides.rubyonrails.org/ security.html.
  • 83
    • 70449676927 scopus 로고    scopus 로고
    • David Ross. 2008. IE 8 XSS Filter Architecture. http://blogs.technet.com/ swi/archive/2008/08/19/ie-8-xss-filter-architecture-implementation.aspx.
    • (2008) IE 8 XSS Filter Architecture
    • Ross, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.