메뉴 건너뛰기




Volumn , Issue , 2014, Pages 149-162

Hidden GEMs: Automated discovery of access control vulnerabilities in Graphical User Interfaces

Author keywords

access control; automation; GUI; vulnerability analysis; widget

Indexed keywords

ACCESS CONTROL; AUTOMATION; GEMS; MINERS;

EID: 84914173351     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2014.17     Document Type: Conference Paper
Times cited : (13)

References (29)
  • 2
    • 84914149294 scopus 로고    scopus 로고
    • Auto It Consulting Ltd.
    • Auto It Consulting Ltd. (2013) Autolt. http://www.autoitscript.com.
    • (2013) Autolt
  • 7
    • 84914126514 scopus 로고    scopus 로고
    • (July)
    • J. Brown. (2012, July) Win Spy++. http://www.catch22.net/software/winspy-17.
    • (2012) Win Spy++
    • Brown, J.1
  • 12
    • 84914126512 scopus 로고    scopus 로고
    • HP/Mercury Interactive. (2003) Win Runner. http://support.openview. hp.com/encore/wr.j sp.
    • (2003) Win Runner
  • 13
    • 84914143128 scopus 로고    scopus 로고
    • nmap I
    • Insecure.org, "NMap Network Scanner," http://www.insecure.org/nmap I, 2008.
    • (2008) NMap Network Scanner
  • 17
    • 84914126510 scopus 로고    scopus 로고
    • Microsoft. (2013) Visual Studio Spy++. http://msdn.microsoft.com/en-us/library/dd460756.aspx.
    • (2013) Visual Studio Spy++
  • 18
    • 84914126509 scopus 로고    scopus 로고
    • (October)
    • B. Moore. (2003, October) Shattering by Example, http://www.blackhat.com/presentations/bh-usa-04/bh-us-04-moore/bh-us-04-moore-whitepaper.pdf.
    • (2003) Shattering by Example
    • Moore, B.1
  • 20
    • 34250643603 scopus 로고    scopus 로고
    • Nikto, "Web Server Scanner," http://www.cirt.net/code/nikto.shtml, 2008.
    • (2008) Web Server Scanner
  • 25
    • 84914126507 scopus 로고    scopus 로고
    • PROFFIX Software AG. (2013) PROFFIX. http://www.proffix.net.
    • (2013) PROFFIX


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.