메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK SECURITY; WEBSITES;

EID: 84948145339     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (38)

References (34)
  • 9
    • 85180622543 scopus 로고    scopus 로고
    • Cenzic. Cenzic Hailstormr. http://www.cenzic.com/, 2010.
    • (2010) Cenzic Hailstormr
  • 13
    • 85093177802 scopus 로고    scopus 로고
    • B. D. A. G. and
    • B. D. A. G. and M. Stampar. sqlmap. http://sqlmap.sourceforge.net.
    • sqlmap
    • Stampar, M.1
  • 16
    • 0024089972 scopus 로고
    • The Confused Deputy: (or why capabilities might have been invented)
    • October
    • N. Hardy. The Confused Deputy: (or why capabilities might have been invented). ACM SIGOPS Operating Systems Review, 22(4), October 1988.
    • (1988) ACM SIGOPS Operating Systems Review , vol.22 , Issue.4
    • Hardy, N.1
  • 17
    • 84880450431 scopus 로고    scopus 로고
    • Web Application Security Assessment by Fault Injection and Behavior Monitoring
    • Y. Huang, S. Huang, and T. Lin. Web Application Security Assessment by Fault Injection and Behavior Monitoring. 12th World Wide Web Conference, 2003.
    • (2003) 12th World Wide Web Conference
    • Huang, Y.1    Huang, S.2    Lin, T.3
  • 18
    • 85180634947 scopus 로고    scopus 로고
    • Insecure.org
    • Insecure.org. NMap Network Scanner. http://www.insecure.org/nmap/, 2010.
    • (2010) NMap Network Scanner
  • 21
    • 41949126461 scopus 로고    scopus 로고
    • Why and How to Perform Fraud Experiments
    • March-April
    • M. Jakobsson, P. Finn, and N. Johnson. Why and How to Perform Fraud Experiments. Security & Privacy, IEEE, 6(2):66–68, March-April 2008.
    • (2008) Security & Privacy, IEEE , vol.6 , Issue.2 , pp. 66-68
    • Jakobsson, M.1    Finn, P.2    Johnson, N.3
  • 23
    • 33751027156 scopus 로고    scopus 로고
    • Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)
    • N. Jovanovic, C. Kruegel, and E. Kirda. Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper). In IEEE Symposium on Security and Privacy, 2006.
    • (2006) IEEE Symposium on Security and Privacy
    • Jovanovic, N.1    Kruegel, C.2    Kirda, E.3
  • 26
    • 85180637120 scopus 로고    scopus 로고
    • Nikto
    • Nikto. Web Server Scanner. http://www.cirt.net/code/nikto.shtml, 2010.
    • (2010) Web Server Scanner
  • 27
    • 84868315985 scopus 로고    scopus 로고
    • OWASP AppSec Europe May 2009
    • OWASP AppSec Europe 2009. HTTP Parameter Pollution, May 2009. http://www.owasp.org/images/b/ba/AppsecEU09 CarettoniDiPaola v0.8.pdf.
    • (2009) HTTP Parameter Pollution
  • 28
    • 0040966631 scopus 로고
    • Pattern matching: The gestalt approach
    • J. Ratcliff and D. Metzener. Pattern matching: The gestalt approach. Dr. Dobbs Journal, 7:46, 1988.
    • (1988) Dr. Dobbs Journal , vol.7 , pp. 46
    • Ratcliff, J.1    Metzener, D.2
  • 34
    • 84910681237 scopus 로고    scopus 로고
    • Static Detection of Security Vulnerabilities in Scripting Languages
    • Y. Xie and A. Aiken. Static Detection of Security Vulnerabilities in Scripting Languages. In 15th USENIX Security Symposium, 2006.
    • (2006) 15th USENIX Security Symposium
    • Xie, Y.1    Aiken, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.