-
4
-
-
50249115131
-
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications
-
D. Balzarotti, M. Cova, V. Felmetsger, D. Balzarotti, N. Jovanovic, C. Kruegel, E. Kirda, and G. Vigna. Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. In IEEE Symposium on Security and Privacy, 2008.
-
(2008)
IEEE Symposium on Security and Privacy
-
-
Balzarotti, D.1
Cova, M.2
Felmetsger, V.3
Balzarotti, D.4
Jovanovic, N.5
Kruegel, C.6
Kirda, E.7
Vigna, G.8
-
9
-
-
85180622543
-
-
Cenzic. Cenzic Hailstormr. http://www.cenzic.com/, 2010.
-
(2010)
Cenzic Hailstormr
-
-
-
11
-
-
77955036132
-
Why Johnny Cant Pen-test: An Analysis of Black-Box Web Vulnerability Scanners
-
A. Doupé, M. Cova, and G. Vigna. Why Johnny Cant Pen-test: An Analysis of Black-Box Web Vulnerability Scanners. Detection of Intrusions and Malware, and Vulnerability Assessment, pages 111–131, 2010.
-
(2010)
Detection of Intrusions and Malware, and Vulnerability Assessment
, pp. 111-131
-
-
Doupé, A.1
Cova, M.2
Vigna, G.3
-
12
-
-
0003415244
-
-
R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, and T. Berners-Lee. Rfc 2616, hypertext transfer protocol – http/1.1, 1999. http://www.rfc.net/rfc2616.html.
-
(1999)
Rfc 2616, hypertext transfer protocol – http/1.1
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Masinter, L.5
Leach, P.6
Berners-Lee, T.7
-
13
-
-
85093177802
-
-
B. D. A. G. and
-
B. D. A. G. and M. Stampar. sqlmap. http://sqlmap.sourceforge.net.
-
sqlmap
-
-
Stampar, M.1
-
16
-
-
0024089972
-
The Confused Deputy: (or why capabilities might have been invented)
-
October
-
N. Hardy. The Confused Deputy: (or why capabilities might have been invented). ACM SIGOPS Operating Systems Review, 22(4), October 1988.
-
(1988)
ACM SIGOPS Operating Systems Review
, vol.22
, Issue.4
-
-
Hardy, N.1
-
17
-
-
84880450431
-
Web Application Security Assessment by Fault Injection and Behavior Monitoring
-
Y. Huang, S. Huang, and T. Lin. Web Application Security Assessment by Fault Injection and Behavior Monitoring. 12th World Wide Web Conference, 2003.
-
(2003)
12th World Wide Web Conference
-
-
Huang, Y.1
Huang, S.2
Lin, T.3
-
18
-
-
85180634947
-
-
Insecure.org
-
Insecure.org. NMap Network Scanner. http://www.insecure.org/nmap/, 2010.
-
(2010)
NMap Network Scanner
-
-
-
21
-
-
41949126461
-
Why and How to Perform Fraud Experiments
-
March-April
-
M. Jakobsson, P. Finn, and N. Johnson. Why and How to Perform Fraud Experiments. Security & Privacy, IEEE, 6(2):66–68, March-April 2008.
-
(2008)
Security & Privacy, IEEE
, vol.6
, Issue.2
, pp. 66-68
-
-
Jakobsson, M.1
Finn, P.2
Johnson, N.3
-
26
-
-
85180637120
-
-
Nikto
-
Nikto. Web Server Scanner. http://www.cirt.net/code/nikto.shtml, 2010.
-
(2010)
Web Server Scanner
-
-
-
27
-
-
84868315985
-
-
OWASP AppSec Europe May 2009
-
OWASP AppSec Europe 2009. HTTP Parameter Pollution, May 2009. http://www.owasp.org/images/b/ba/AppsecEU09 CarettoniDiPaola v0.8.pdf.
-
(2009)
HTTP Parameter Pollution
-
-
-
28
-
-
0040966631
-
Pattern matching: The gestalt approach
-
J. Ratcliff and D. Metzener. Pattern matching: The gestalt approach. Dr. Dobbs Journal, 7:46, 1988.
-
(1988)
Dr. Dobbs Journal
, vol.7
, pp. 46
-
-
Ratcliff, J.1
Metzener, D.2
-
34
-
-
84910681237
-
Static Detection of Security Vulnerabilities in Scripting Languages
-
Y. Xie and A. Aiken. Static Detection of Security Vulnerabilities in Scripting Languages. In 15th USENIX Security Symposium, 2006.
-
(2006)
15th USENIX Security Symposium
-
-
Xie, Y.1
Aiken, A.2
|