-
2
-
-
84880843062
-
Predicting SQL injection and cross site scripting vulnerabilities through mining input sanitization patterns
-
L. K. Shar and H. B. K. Tan, "Predicting SQL injection and cross site scripting vulnerabilities through mining input sanitization patterns," Inf. Softw. Technol., vol. 55, no. 10, pp. 1767-1780, 2013.
-
(2013)
Inf. Softw. Technol.
, vol.55
, Issue.10
, pp. 1767-1780
-
-
Shar, L.K.1
Tan, H.B.K.2
-
3
-
-
33751027156
-
Pixy: A static analysis tool for detecting web application vulnerabilities
-
N. Jovanovic, C. Kruegel, E. Kirda, "Pixy: A static analysis tool for detecting web application vulnerabilities," in Proc. IEEE Symp. Security Privacy, 2006, pp. 258-263.
-
(2006)
Proc. IEEE Symp. Security Privacy
, pp. 258-263
-
-
Jovanovic, N.1
Kruegel, C.2
Kirda, E.3
-
4
-
-
84910681237
-
Static detection of security vulnerabilities in scripting languages
-
Y. Xie and A. Aiken, "Static detection of security vulnerabilities in scripting languages," in Proc. USENIX Security Symp., 2006, pp. 179-192.
-
(2006)
Proc. USENIX Security Symp.
, pp. 179-192
-
-
Xie, Y.1
Aiken, A.2
-
5
-
-
35348898067
-
-
Mar. [Online]. Available:
-
(2012, Mar.). SourceForge. [Online]. Available: http://www.sourceforge. net
-
(2012)
SourceForge
-
-
-
7
-
-
84959283724
-
-
[Online]. Availble:
-
PhpMiner [Online]. Availble: http://sharlwinkhin.com/phpminer.html, 2013.
-
(2013)
Php Miner
-
-
-
8
-
-
0023385308
-
The program dependence graph and its use in optimization
-
J. Ferrante, K. J. Ottenstein, J. D. Warren, "The program dependence graph and its use in optimization," ACM Trans. Programm. Languages Syst., vol. 9, pp. 319-349, 1987.
-
(1987)
ACM Trans. Programm. Languages Syst.
, vol.9
, pp. 319-349
-
-
Ferrante, J.1
Ottenstein, K.J.2
Warren, J.D.3
-
9
-
-
85014149758
-
-
San Mateo, CA, USA: Morgan Kaufmann
-
I. H. Witten, E. Frank, M. A. Hall, Data Mining, 3rd ed. San Mateo, CA, USA: Morgan Kaufmann, 2011.
-
(2011)
Data Mining 3rd Ed
-
-
Witten, I.H.1
Frank, E.2
Hall, M.A.3
-
10
-
-
84959256246
-
-
Mar. [Online]. Available:
-
(2012, Mar.). RSnake [Online]. Available: http://ha.ckers.org
-
(2012)
Rsnake
-
-
-
11
-
-
50249115131
-
Saner: Composing static and dynamic analysis to validate sanitization in web applications
-
D. Balzarotti, M. Cova, V. Felmetsger, N. Jovanovic, E. Kirda, C. Kruegel, G. Vigna, "Saner: Composing static and dynamic analysis to validate sanitization in web applications," in Proc. IEEE Symp. Security Privacy, 2008, pp. 387-401.
-
(2008)
Proc. IEEE Symp. Security Privacy
, pp. 387-401
-
-
Balzarotti, D.1
Cova, M.2
Felmetsger, V.3
Jovanovic, N.4
Kirda, E.5
Kruegel, C.6
Vigna, G.7
-
12
-
-
0343280011
-
Exploring the relationships between design measures and software quality in object-oriented systems
-
L. C. Briand, J. Wust, J. W. Daly, D. V. Porter, "Exploring the relationships between design measures and software quality in object-oriented systems," J. Syst. Softw., vol. 51, no. 3, pp. 245-273, 2000.
-
(2000)
J. Syst. Softw.
, vol.51
, Issue.3
, pp. 245-273
-
-
Briand, L.C.1
Wust, J.2
Daly, J.W.3
Porter, D.V.4
-
13
-
-
71649110371
-
A systematic and comprehensive investigation of methods to build and evaluate fault prediction models
-
E. Arisholm, L. C. Briand, E. B. Johannessen, "A systematic and comprehensive investigation of methods to build and evaluate fault prediction models," J. Syst. Softw., vol. 83, no. 1, pp. 2-17, 2010.
-
(2010)
J. Syst. Softw.
, vol.83
, Issue.1
, pp. 2-17
-
-
Arisholm, E.1
Briand, L.C.2
Johannessen, E.B.3
-
14
-
-
49349089233
-
Benchmarking classification models for software defect prediction: A proposed framework and novel findings
-
Jul./Aug.
-
S. Lessmann, B. Baesens, C. Mues, S. Pietsch, "Benchmarking classification models for software defect prediction: a proposed framework and novel findings," IEEE Trans. Softw. Eng., vol. 34, no. 4, pp. 485-496, Jul./Aug. 2008.
-
(2008)
IEEE Trans. Softw. Eng.
, vol.34
, Issue.4
, pp. 485-496
-
-
Lessmann, S.1
Baesens, B.2
Mues, C.3
Pietsch, S.4
-
15
-
-
77956972220
-
Defect prediction from static code features: Current results, limitations, new approaches
-
T. Menzies, Z. Milton, B. Turhan, B. Cukic, Y. Jiang, A. Bener, "Defect prediction from static code features: current results, limitations, new approaches," Automated Softw. Eng., vol. 17, no. 4, pp. 375-407, 2010.
-
(2010)
Automated Softw. Eng.
, vol.17
, Issue.4
, pp. 375-407
-
-
Menzies, T.1
Milton, Z.2
Turhan, B.3
Cukic, B.4
Jiang, Y.5
Bener, A.6
-
16
-
-
84866920422
-
Predicting common web application vulnerabilities from input validation and sanitization code patterns
-
L. K. Shar and H. B. K. Tan, "Predicting common web application vulnerabilities from input validation and sanitization code patterns," in Proc. Int. Conf. Automated Softw. Eng., 2012, pp. 310-313.
-
(2012)
Proc. Int. Conf. Automated Softw. Eng.
, pp. 310-313
-
-
Shar, L.K.1
Tan, H.B.K.2
-
19
-
-
47949103719
-
The effects of over and under sampling on fault-prone module detection
-
Y. Kamei, A. Monden, S. Matsumoto, T. Kakimoto, K. Matsumoto, "The effects of over and under sampling on fault-prone module detection," in Proc. Int. Symp. Empirical Softw. Eng. Meas., 2007, pp. 196-204.
-
(2007)
Proc. Int. Symp. Empirical Softw. Eng. Meas.
, pp. 196-204
-
-
Kamei, Y.1
Monden, A.2
Matsumoto, S.3
Kakimoto, T.4
Matsumoto, K.5
-
20
-
-
29644438050
-
Statistical comparisons of classifiers over multiple data sets
-
J. Dem-sar, "Statistical comparisons of classifiers over multiple data sets," J. Mach. Learning Res., vol. 7, pp. 1-30, 2006.
-
(2006)
J. Mach. Learning Res.
, vol.7
, pp. 1-30
-
-
Demsar, J.1
-
21
-
-
77949879017
-
Automatic creation of SQL injection and cross-site scripting attacks
-
A. Kie-zun, P. J. Guo, K. Jayaraman, M. D. Ernst, "Automatic creation of SQL injection and cross-site scripting attacks," in Proc. Int. Conf. Softw. Eng., 2009, pp. 199-209.
-
(2009)
Proc. Int. Conf. Softw. Eng.
, pp. 199-209
-
-
Kiezun, A.1
Guo, P.J.2
Jayaraman, K.3
Ernst, M.D.4
-
22
-
-
85084163766
-
Automatic generation of XSS and SQL injection attacks with goal-directed model checking
-
M. Martin and M. S. Lam, "Automatic generation of XSS and SQL injection attacks with goal-directed model checking," in Proc. USENIX Security Symp., 2008, pp. 31-43.
-
(2008)
Proc. USENIX Security Symp.
, pp. 31-43
-
-
Martin, M.1
Lam, M.S.2
-
23
-
-
83555172467
-
Evaluating complexity, code churn, developer activity metrics as indicators of software vulnerabilities
-
Nov./Dec.
-
Y. Shin, A. Meneely, L. Williams, J. A. Osborne, "Evaluating complexity, code churn, developer activity metrics as indicators of software vulnerabilities," IEEE Trans. Softw. Eng., vol. 37, no. 6, pp. 772-787, Nov./Dec. 2011.
-
(2011)
IEEE Trans. Softw. Eng.
, vol.37
, Issue.6
, pp. 772-787
-
-
Shin, Y.1
Meneely, A.2
Williams, L.3
Osborne, J.A.4
-
24
-
-
72449154095
-
Security of open source web applications
-
J. Walden, M. Doyle, G. A. Welch, M. Whelan, "Security of open source web applications," in Proc. Int. Symp. Empirical Softw. Eng. Meas., 2009, pp. 545-553.
-
(2009)
Proc. Int. Symp. Empirical Softw. Eng. Meas.
, pp. 545-553
-
-
Walden, J.1
Doyle, M.2
Welch, G.A.3
Whelan, M.4
-
25
-
-
34547700305
-
Using historical in-process and product metrics for early estimation of software failures
-
N. Nagappan, T. Ball, B. Murphy, "Using historical in-process and product metrics for early estimation of software failures," in Proc. Int. Symp. Softw. Rel. Eng., 2006, pp. 62-74.
-
(2006)
Proc. Int. Symp. Softw. Rel. Eng.
, pp. 62-74
-
-
Nagappan, N.1
Ball, T.2
Murphy, B.3
-
26
-
-
67249126825
-
Predicting vulnerable software components
-
S. Neuhaus, T. Zimmermann, C. Holler, A. Zeller, "Predicting vulnerable software components," in Proc. ACM Conf. Comput. Commun. Security, 2007, pp. 529-540.
-
(2007)
Proc. ACM Conf. Comput. Commun. Security
, pp. 529-540
-
-
Neuhaus, S.1
Zimmermann, T.2
Holler, C.3
Zeller, A.4
-
27
-
-
79952423152
-
A string constraint solver for detecting web application vulnerability
-
X. Fu and C.-C. Li, "A string constraint solver for detecting web application vulnerability," in Proc. Int. Conf. Softw. Eng. Knowl. Eng., 2010, pp. 535-542.
-
(2010)
Proc. Int. Conf. Softw. Eng. Knowl. Eng.
, pp. 535-542
-
-
Fu, X.1
Li, C.-C.2
-
29
-
-
84855479474
-
Automated removal of cross site scripting vulnerabilities in web applications
-
L. K. Shar and H. B. K. Tan, "Automated removal of cross site scripting vulnerabilities in web applications," Inf. Softw. Technol., vol. 54, no. 5, pp. 467-478, 2012.
-
(2012)
Inf. Softw. Technol.
, vol.54
, Issue.5
, pp. 467-478
-
-
Shar, L.K.1
Tan, H.B.K.2
-
30
-
-
80053121582
-
Directed symbolic execution
-
K.-K. Ma, K. Y. Phang, J. S. Foster, M. Hicks, "Directed symbolic execution," in Proc. Int. Conf. Static Anal., 2011, pp. 95-111.
-
(2011)
Proc. Int. Conf. Static Anal.
, pp. 95-111
-
-
Ma, K.-K.1
Phang, K.Y.2
Foster, J.S.3
Hicks, M.4
-
32
-
-
0025228221
-
Interprocedural slicing using dependence graphs
-
S. Horwitz, T. Reps, D. Binkley, "Interprocedural slicing using dependence graphs," ACM Trans. Program. Languages Syst., vol. 12, no. 1, pp. 26-61, 1990.
-
(1990)
ACM Trans. Program. Languages Syst.
, vol.12
, Issue.1
, pp. 26-61
-
-
Horwitz, S.1
Reps, T.2
Binkley, D.3
-
33
-
-
84886430853
-
Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis
-
L. K. Shar, H. B. K. Tan, L. C. Briand, "Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis," in Proc. Int. Conf. Softw. Eng., 2013, pp. 642-651.
-
(2013)
Proc. Int. Conf. Softw. Eng.
, pp. 642-651
-
-
Shar, L.K.1
Tan, H.B.K.2
Briand, L.C.3
-
34
-
-
33845782503
-
Data mining static code attributes to learn defect predictors
-
Jan.
-
T. Menzies, J. Greenwald, A. Frank, "Data mining static code attributes to learn defect predictors," IEEE Trans. Softw. Eng., vol. 33, no. 1, pp. 2-13, Jan. 2007.
-
(2007)
IEEE Trans. Softw. Eng.
, vol.33
, Issue.1
, pp. 2-13
-
-
Menzies, T.1
Greenwald, J.2
Frank, A.3
-
35
-
-
79957799751
-
A general software defect-proneness prediction framework
-
May/Jun.
-
Q. Song, Z. Jia, M. Shepperd, S. Ying, J. Liu, "A general software defect-proneness prediction framework," IEEE Trans. Softw. Eng., vol. 37, no. 3, pp. 356-370, May/Jun. 2011.
-
(2011)
IEEE Trans. Softw. Eng.
, vol.37
, Issue.3
, pp. 356-370
-
-
Song, Q.1
Jia, Z.2
Shepperd, M.3
Ying, S.4
Liu, J.5
-
36
-
-
85152529520
-
Ordering effects in clustering
-
D. Fisher, L. Xu, N. Zard, "Ordering effects in clustering," in Proc. Int. Workshop Mach. Learning, 1992, pp. 163-168.
-
(1992)
Proc. Int. Workshop Mach. Learning
, pp. 163-168
-
-
Fisher, D.1
Xu, L.2
Zard, N.3
-
37
-
-
0035478854
-
Random forests
-
L. Breiman, "Random forests," Mach. Learning, vol. 45, no. 1, pp. 5-32, 2001.
-
(2001)
Mach. Learning
, vol.45
, Issue.1
, pp. 5-32
-
-
Breiman, L.1
-
38
-
-
84977601395
-
-
New York NY USA: Wiley
-
D. W. Hosmer Jr, S. Lemeshow, R. X. Sturdivant, Applied Logistic Regression, 3rd ed. New York, NY, USA: Wiley, 2013.
-
(2013)
Applied Logistic Regression 3rd Ed
-
-
Hosmer, D.W.1
Lemeshow, S.2
Sturdivant, R.X.3
-
39
-
-
33749252873
-
-
Cambridge, MA, USA: MIT Press
-
O. Chapelle, B. Scholkopf, A. Zien, Eds., Semi-Supervised Learning. Cambridge, MA, USA: MIT Press, 2006.
-
(2006)
Semi-Supervised Learning
-
-
Chapelle, O.1
Scholkopf, B.2
Zien, A.3
-
40
-
-
84856674640
-
Sample-based software defect prediction with active and semi-supervised learning
-
M. Li, H. Zhang, R. Wu, Z.-H. Zhou, "Sample-based software defect prediction with active and semi-supervised learning," Automated Softw. Eng., vol. 19, pp. 201-230, 2012.
-
(2012)
Automated Softw. Eng.
, vol.19
, pp. 201-230
-
-
Li, M.1
Zhang, H.2
Wu, R.3
Zhou, Z.-H.4
-
41
-
-
84866952457
-
Software defect prediction using semi-supervised learning with dimension reduction
-
H. Lu, B. Cukic, M. Culp, "Software defect prediction using semi-supervised learning with dimension reduction," in Proc. Int. Conf. Automated Softw. Eng., 2012, pp. 314-317.
-
(2012)
Proc. Int. Conf. Automated Softw. Eng.
, pp. 314-317
-
-
Lu, H.1
Cukic, B.2
Culp, M.3
-
42
-
-
36249007597
-
Improve computer-aided diagnosis with machine learning techniques using undiagnosed samples
-
Nov.
-
M. Li and Z.-H. Zhou, "Improve computer-aided diagnosis with machine learning techniques using undiagnosed samples," IEEE Trans. Syst., Man Cyberne., Part A: Syst. Humans, vol. 37, no. 6, pp. 1088-1098, Nov. 2007.
-
(2007)
IEEE Trans. Syst., Man Cyberne., Part A: Syst. Humans
, vol.37
, Issue.6
, pp. 1088-1098
-
-
Li, M.1
Zhou, Z.-H.2
-
44
-
-
84959270456
-
Chord: A versatile platform for program analysis
-
[Online]. Available:
-
Chord: A versatile platform for program analysis. (2011). Proc. Tutorial ACM Conf. Program. Language Des. Implementation [Online]. Available: http://pag.gatech.edu/chord
-
(2011)
Proc. Tutorial ACM Conf. Program. Language Des. Implementation
-
-
-
45
-
-
84872116710
-
Generalized vulnerability extrapolation using abstract syntax trees
-
F. Yamaguchi, M. Lottmann, K. Rieck, "Generalized vulnerability extrapolation using abstract syntax trees," in Proc. Annu. Comput. Security Appl. Conf., 2012, pp. 359-368.
-
(2012)
Proc. Annu. Comput. Security Appl. Conf.
, pp. 359-368
-
-
Yamaguchi, F.1
Lottmann, M.2
Rieck, K.3
-
46
-
-
84888990646
-
Chucky: Exposing missing checks in source code for vulnerability discovery
-
F. Yamaguchi, C. Wressnegger, H. Gascon, K. Rieck, "Chucky: Exposing missing checks in source code for vulnerability discovery," in Proc. ACM SIGSAC Conf. Comput. Commun. Security, 2013, pp. 499-510.
-
(2013)
Proc. ACM SIGSAC Conf. Comput. Commun. Security
, pp. 499-510
-
-
Yamaguchi, F.1
Wressnegger, C.2
Gascon, H.3
Rieck, K.4
-
47
-
-
84959304761
-
-
[Online]. Available:
-
PHP Security [Online]. Available: http://www.php.net/manual/en/security.php, 2013.
-
(2013)
PHP Security
-
-
-
48
-
-
56349089205
-
ADASYN: Adaptive synthetic sampling approach for imbalanced learning
-
H. He, Y. Bai, E. A. Garcia, S. Li, "ADASYN: Adaptive synthetic sampling approach for imbalanced learning," in Proc. Int. Joint Conf. Neural Netw., 2008, pp. 1322-1328.
-
(2008)
Proc. Int. Joint Conf. Neural Netw.
, pp. 1322-1328
-
-
He, H.1
Bai, Y.2
Garcia, E.A.3
Li, S.4
-
49
-
-
68549133155
-
Learning from imbalanced data
-
Sep.
-
H. He and E. A. Garcia, "Learning from imbalanced data," IEEE Trans. Knowl. Data Eng., vol. 21, no. 9, pp. 1263-1284, Sep. 2009.
-
(2009)
IEEE Trans. Knowl. Data Eng.
, vol.21
, Issue.9
, pp. 1263-1284
-
-
He, H.1
Garcia, E.A.2
-
50
-
-
0004060921
-
-
Ph.D. thesis Dept. Comput. Sci., Univ. Waikato, Hamilton, New Zealand
-
M. A. Hall, "Correlation-based feature selection for machine learning," Ph.D. thesis, Dept. Comput. Sci., Univ. Waikato, Hamilton, New Zealand, 1998.
-
(1998)
Correlation-based Feature Selection for Machine Learning
-
-
Hall, M.A.1
-
51
-
-
84959297476
-
-
[Online]. Available:
-
PHP Top 5 [Online]. Available: https://www.owasp.org/index. php/PHP-Top-5, 2014.
-
(2014)
PHP Top 5
-
-
|