-
2
-
-
33745653593
-
-
more
-
C. Anley. (more) advanced SQL injection. http://www.nextgenss.com/papers/more_advanced_sql_injection.pdf, 2002.
-
(2002)
Advanced SQL Injection
-
-
Anley, C.1
-
3
-
-
14744271696
-
Software penetration testing
-
B. Arkin, S. Stender, and G. McGraw. Software penetration testing. IEEE Security and Privacy, 3(1):84–87, 2005.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.1
, pp. 84-87
-
-
Arkin, B.1
Stender, S.2
McGraw, G.3
-
10
-
-
3242808612
-
-
Computer Security Institute. Computer crime and security survey. http://www.gocsi.com/press/20020407.jhtml?_requestid=195148, 2002.
-
(2002)
Computer Crime and Security Survey
-
-
-
12
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
January
-
C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proceedings of the 7th USENIX Security Conference, pages 63–78, January 1998.
-
(1998)
Proceedings of the 7th USENIX Security Conference
, pp. 63-78
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
13
-
-
4444287727
-
-
Addison-Wesley Professional
-
J. D’Anjou, S. Fairbrother, D. Kehn, J. Kellerman, and P. McCarthy. Java Developer’s Guide to Eclipse. Addison-Wesley Professional, 2004.
-
(2004)
Java Developer’s Guide to Eclipse
-
-
D’Anjou, J.1
Fairbrother, S.2
Kehn, D.3
Kellerman, J.4
McCarthy, P.5
-
16
-
-
85077570304
-
-
Gentoo Linux Security Advisory
-
Gentoo Linux Security Advisory. SnipSnap: HTTP response splitting. http://www.gentoo.org/security/en/glsa/glsa-200409-23.xml, 2004.
-
(2004)
SnipSnap: HTTP Response Splitting
-
-
-
20
-
-
0036039794
-
A system and language for building system-specific, static analyses
-
S. Hallem, B. Chelf, Y. Xie, and D. Engler. A system and language for building system-specific, static analyses. In Proceedings of the ACM SIG-PLAN 2002 Conference on Programming language Design and Implementation, pages 69–82, 2002.
-
(2002)
Proceedings of the ACM SIG-PLAN 2002 Conference on Programming Language Design and Implementation
, pp. 69-82
-
-
Hallem, S.1
Chelf, B.2
Xie, Y.3
Engler, D.4
-
23
-
-
19944365247
-
Securing web application code by static analysis and runtime protection
-
Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D.-T. Lee, and S.-Y. Kuo. Securing Web application code by static analysis and runtime protection. In Proceedings of the 13th conference on World Wide Web, pages 40–52, 2004.
-
(2004)
Proceedings of the 13th Conference on World Wide Web
, pp. 40-52
-
-
Huang, Y.-W.1
Yu, F.2
Hang, C.3
Tsai, C.-H.4
Lee, D.-T.5
Kuo, S.-Y.6
-
35
-
-
33745194478
-
Finding application errors using PQL: A program query language (to be published)
-
Oct
-
M. Martin, V. B. Livshits, and M. S. Lam. Finding application errors using PQL: a program query language (to be published). In Proceedings of the ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA), Oct. 2005.
-
(2005)
Proceedings of the ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA)
-
-
Martin, M.1
Livshits, V.B.2
Lam, M.S.3
-
40
-
-
85077609081
-
-
Open Web Application Security Project
-
Open Web Application Security Project. A guide to building secure Web applications. http://voxel.dl.sourceforge.net/sourceforge/owasp/OWASPGuideV1.1.pdf, 2004.
-
(2004)
A Guide to Building Secure Web Applications
-
-
-
42
-
-
85077615530
-
-
Open Web Application Security Project. WebScarab. http://www.owasp.org/software/webscarab.html, 2004.
-
(2004)
WebScarab
-
-
-
45
-
-
85084164620
-
Detecting format string vulnerabilities with type qualifiers
-
Aug
-
U. Shankar, K. Talwar, J. S. Foster, and D. Wagner. Detecting format string vulnerabilities with type qualifiers. In Proceedings of the 2001 Usenix Security Conference, pages 201–220, Aug. 2001.
-
(2001)
Proceedings of the 2001 Usenix Security Conference
, pp. 201-220
-
-
Shankar, U.1
Talwar, K.2
Foster, J.S.3
Wagner, D.4
-
51
-
-
85081874807
-
A first step towards automated detection of buffer overrun vulnerabilities
-
Feb
-
D. Wagner, J. Foster, E. Brewer, and A. Aiken. A first step towards automated detection of buffer overrun vulnerabilities. In Proceedings of Network and Distributed Systems Security Symposium, pages 3–17, Feb. 2000.
-
(2000)
Proceedings of Network and Distributed Systems Security Symposium
, pp. 3-17
-
-
Wagner, D.1
Foster, J.2
Brewer, E.3
Aiken, A.4
-
52
-
-
0004207406
-
-
O’Reilly and Associates, Sebastopol, CA
-
L. Wall, T. Christiansen, and R. Schwartz. Programming Perl. O’Reilly and Associates, Sebastopol, CA, 1996.
-
(1996)
Programming Perl
-
-
Wall, L.1
Christiansen, T.2
Schwartz, R.3
|