-
2
-
-
33749823368
-
Static approximation of dynamically generated Web pages
-
Y. Minamide, "Static approximation of dynamically generated Web pages," in Proc. 14th Int. Conf. World Wide Web (WWW), 2005, pp. 432-441.
-
(2005)
Proc. 14th Int. Conf. World Wide Web (WWW)
, pp. 432-441
-
-
Minamide, Y.1
-
4
-
-
80053079139
-
Static enforcement of Web application integrity through strong typing
-
W. Robertson and G. Vigna, "Static enforcement of Web application integrity through strong typing," in Proc. 18th Conf. USENIX Secur. Symp. (SSYM), 2009, pp. 283-298.
-
(2009)
Proc. 18th Conf. USENIX Secur. Symp. (SSYM)
, pp. 283-298
-
-
Robertson, W.1
Vigna, G.2
-
5
-
-
36448963891
-
-
San Diego, CA, USA: Stanford Univ. Press, Oct.
-
M. Martin, B. Livshits, and M. S. Lam, SecuriFly: Runtime Vulnerability Protection for Web Applications. San Diego, CA, USA: Stanford Univ. Press, Oct. 2005.
-
(2005)
SecuriFly: Runtime Vulnerability Protection for Web Applications
-
-
Martin, M.1
Livshits, B.2
Lam, M.S.3
-
6
-
-
56149111605
-
Domain-specific languages and program generation with meta-AspectJ
-
S. S. Huang, D. Zook, and Y. Smaragdakis, "Domain-specific languages and program generation with meta-AspectJ," ACM Trans. Softw. Eng. Methodol., vol. 18, no. 2, 2008, Art. no. 6.
-
(2008)
ACM Trans. Softw. Eng. Methodol.
, vol.18
, Issue.2
-
-
Huang, S.S.1
Zook, D.2
Smaragdakis, Y.3
-
7
-
-
84886397020
-
Path sensitive static analysis of Web applications for remote code execution vulnerability detection
-
May
-
Y. Zheng and X. Zhang, "Path sensitive static analysis of Web applications for remote code execution vulnerability detection," in Proc. Int. Conf. Softw. Eng. (ICSE), May 2013, pp. 652-661.
-
(2013)
Proc. Int. Conf. Softw. Eng. (ICSE)
, pp. 652-661
-
-
Zheng, Y.1
Zhang, X.2
-
8
-
-
77951574421
-
STRANGER: An automata-based string analysis tool for PHP
-
F. Yu, M. Alkhalaf, and T. Bultan, "STRANGER: An automata-based string analysis tool for PHP," in Proc. 16th Int. Conf. Tools Algorithms Constr. Anal. Syst. (TACAS), 2010, pp. 154-157.
-
(2010)
Proc. 16th Int. Conf. Tools Algorithms Constr. Anal. Syst. (TACAS)
, pp. 154-157
-
-
Yu, F.1
Alkhalaf, M.2
Bultan, T.3
-
9
-
-
80755187784
-
SCRIPTGARD: Automatic context-sensitive sanitization for large-scale legacy Web applications
-
P. Saxena, D. Molnar, and B. Livshits, "SCRIPTGARD: Automatic context-sensitive sanitization for large-scale legacy Web applications," in Proc. 18th ACM Conf. Comput. Commun. Secur. (CCS), 2011, pp. 601-614.
-
(2011)
Proc. 18th ACM Conf. Comput. Commun. Secur. (CCS)
, pp. 601-614
-
-
Saxena, P.1
Molnar, D.2
Livshits, B.3
-
11
-
-
84874861173
-
TamperProof: A server-agnostic defense for parameter tampering attacks on Web applications
-
N. Skrupsky, P. Bisht, T. Hinrichs, V. N. Venkatakrishnan, and L. Zuck, "TamperProof: A server-agnostic defense for parameter tampering attacks on Web applications," in Proc. 3rd ACM Conf. Data Appl. Secur. Privacy (CODASPY), 2013, pp. 129-140.
-
(2013)
Proc. 3rd ACM Conf. Data Appl. Secur. Privacy (CODASPY)
, pp. 129-140
-
-
Skrupsky, N.1
Bisht, P.2
Hinrichs, T.3
Venkatakrishnan, V.N.4
Zuck, L.5
-
12
-
-
84979927986
-
-
accessed on Jan. 5, 2016. [Online]
-
S. Cass. (2015). The 2015 Top Ten Programming Languages, accessed on Jan. 5, 2016. [Online]. Available: http://spectrum. ieee.org/computing/software/the-2015-top-ten-programming-languages
-
(2015)
The 2015 Top Ten Programming Languages
-
-
Cass, S.1
-
13
-
-
33751027156
-
Pixy: A static analysis tool for detecting Web application vulnerabilities
-
Oakland, CA, USA, May
-
N. Jovanovic, C. Kruegel, and E. Kirda, "Pixy: A static analysis tool for detecting Web application vulnerabilities," in Proc. 27th IEEE Symp. Secur. Privacy, Oakland, CA, USA, May 2006, pp. 263-266.
-
(2006)
Proc. 27th IEEE Symp. Secur. Privacy
, pp. 263-266
-
-
Jovanovic, N.1
Kruegel, C.2
Kirda, E.3
-
14
-
-
84951790264
-
Web application protection techniques: A taxonomy
-
Jan.
-
V. Prokhorenko, K.-K. R. Choo, and H. Ashman, "Web application protection techniques: A taxonomy," J. Netw. Comput. Appl., vol. 60, pp. 95-112, Jan. 2016.
-
(2016)
J. Netw. Comput. Appl.
, vol.60
, pp. 95-112
-
-
Prokhorenko, V.1
Choo, K.-K.R.2
Ashman, H.3
-
15
-
-
84942773506
-
Semantic differential repair for input validation and sanitization
-
New York, NY, USA
-
M. Alkhalaf, A. Aydin, and T. Bultan, "Semantic differential repair for input validation and sanitization," in Proc. Int. Symp. Softw. Test. Anal. (ISSTA), New York, NY, USA, 2014, pp. 225-236.
-
(2014)
Proc. Int. Symp. Softw. Test. Anal. (ISSTA)
, pp. 225-236
-
-
Alkhalaf, M.1
Aydin, A.2
Bultan, T.3
-
16
-
-
84922513946
-
Detection model for SQL injection attack: An approach for preventing a Web application from the SQL injection attack
-
Apr.
-
G. Buja, K. B. A. Jalil, F. B. H. M. Ali, and T. F. A. Rahman, "Detection model for SQL injection attack: An approach for preventing a Web application from the SQL injection attack," in Proc. IEEE Symp. Comput. Appl. Ind. Electron. (ISCAIE), Apr. 2014, pp. 60-64.
-
(2014)
Proc. IEEE Symp. Comput. Appl. Ind. Electron. (ISCAIE)
, pp. 60-64
-
-
Buja, G.1
Jalil, K.B.A.2
Ali, F.B.H.M.3
Rahman, T.F.A.4
-
17
-
-
84979927246
-
-
accessed on Jan. 5, 2016. Online
-
BAXTEP, accessed on Jan. 5, 2016. [Online]. Available: https://code. google.com/archive/p/baxtep
-
-
-
-
20
-
-
84959341215
-
Binary code continent: Finer-grained control flow integrity for stripped binaries
-
M. Wang, H. Yin, A. V. Bhaskar, P. Su, and D. Feng, "Binary code continent: Finer-grained control flow integrity for stripped binaries," in Proc. 31st Annu. Comput. Secur. Appl. Conf. (ACSAC), 2015. pp. 331-340.
-
(2015)
Proc. 31st Annu. Comput. Secur. Appl. Conf. (ACSAC)
, pp. 331-340
-
-
Wang, M.1
Yin, H.2
Bhaskar, A.V.3
Su, P.4
Feng, D.5
-
21
-
-
33646767376
-
Control-flow integrity
-
M. Abadi, M. Budiu, Ú. Erlingsson, and J. Ligatti, "Control-flow integrity," in Proc. 12th ACM Conf. Comput. Commun. Secur., 2005, pp. 340-353.
-
(2005)
Proc. 12th ACM Conf. Comput. Commun. Secur.
, pp. 340-353
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, Ú.3
Ligatti, J.4
-
22
-
-
84951835679
-
-
accessed on Jun. 20, 2016. [Online]
-
Forbes. (2013). Wordpress Under Attack: How to Avoid The Coming Botnet, accessed on Jun. 20, 2016. [Online]. Available: http://www.forbes. com/sites/anthonykosner/2013/04/13/wordpress-under-attack-how-toavoid-the-coming-botnet/
-
(2013)
Wordpress under Attack: How to Avoid the Coming Botnet
-
-
-
24
-
-
84987601526
-
-
accessed on Jun. 20, 2016. [Online]
-
Ars Technica. (2015). Just-Released WordPress 0day Makes it Easy to Hijack Millions of Web-Sites, accessed on Jun. 20, 2016. [Online]. Available: http://arstechnica.com/security/2015/04/justreleased-wordpress-0day-makes-it-easy-to-hijack-millions-of-websites/
-
(2015)
Just-Released WordPress 0day Makes It Easy to Hijack Millions of Web-Sites
-
-
-
25
-
-
84951746648
-
-
accessed on Jun. 20, 2016. [Online]
-
Wired. (2012). Black Hat is Over, But SQL Injection Attacks Persist, accessed on Jun. 20, 2016. [Online]. Available: http://www. wired.com/2012/08/black-hat-sql-injection/
-
(2012)
Black Hat Is Over, but SQL Injection Attacks Persist
-
-
-
26
-
-
84901229096
-
A survey on server-side approaches to securing Web applications
-
X. Li and Y. Xue, "A survey on server-side approaches to securing Web applications," ACM Comput. Surv., vol. 46, no. 4, 2014, Art. no. 54.
-
(2014)
ACM Comput. Surv.
, vol.46
, Issue.4
-
-
Li, X.1
Xue, Y.2
-
27
-
-
84979887398
-
-
accessed on Jan. 5, 2016. [Online]
-
ZoneMinder, accessed on Jan. 5, 2016. [Online]. Available: http://zoneminder.com
-
-
-
-
28
-
-
84979907148
-
-
accessed on Jan. 5, 2016. [Online]
-
PHP-CFG, accessed on Jan. 5, 2016. [Online]. Available: https://github.com/ircmaxell/php-cfg
-
PHP-CFG
-
-
-
29
-
-
72949084588
-
SQLProb: A proxybased architecture towards preventing SQL injection attacks
-
A. Liu, Y. Yuan, D. Wijesekera, and A. Stavrou, "SQLProb: A proxybased architecture towards preventing SQL injection attacks," in Proc. ACM Symp. Appl. Comput. (SAC), 2009, pp. 2054-2061.
-
(2009)
Proc. ACM Symp. Appl. Comput. (SAC)
, pp. 2054-2061
-
-
Liu, A.1
Yuan, Y.2
Wijesekera, D.3
Stavrou, A.4
-
30
-
-
78650896178
-
Document structure integrity: A robust basis for cross-site scripting defense
-
Y. Nadji, P. Saxena, and D. Song, "Document structure integrity: A robust basis for cross-site scripting defense," in Proc. NDSS, 2009, p. 20.
-
(2009)
Proc. NDSS
, pp. 20
-
-
Nadji, Y.1
Saxena, P.2
Song, D.3
-
31
-
-
33745201000
-
Anomalous system call detection
-
D. Mutz, F. Valeur, G. Vigna, and C. Kruegel, "Anomalous system call detection," ACM Trans. Inf. Syst. Secur., vol. 9, no. 1, pp. 61-93, 2006.
-
(2006)
ACM Trans. Inf. Syst. Secur.
, vol.9
, Issue.1
, pp. 61-93
-
-
Mutz, D.1
Valeur, F.2
Vigna, G.3
Kruegel, C.4
-
32
-
-
84889019764
-
DeDacota: Toward preventing server-side XSS via automatic code and data separation
-
A. Doupé, W. Cui, M. H. Jakubowski, M. Peinado, C. Kruegel, and G. Vigna, "deDacota: Toward preventing server-side XSS via automatic code and data separation," in Proc. ACM SIGSAC Conf. Comput. Commun. Secur. (CCS), 2013, pp. 1205-1216.
-
(2013)
Proc. ACM SIGSAC Conf. Comput. Commun. Secur. (CCS)
, pp. 1205-1216
-
-
Doupé, A.1
Cui, W.2
Jakubowski, M.H.3
Peinado, M.4
Kruegel, C.5
Vigna, G.6
-
34
-
-
84963877054
-
Context-oriented Web application protection model
-
Jul.
-
V. Prokhorenko, K.-K. R. Choo, and H. Ashman, "Context-oriented Web application protection model," Appl. Math. Comput., vol. 285, pp. 59-78, Jul. 2016.
-
(2016)
Appl. Math. Comput.
, vol.285
, pp. 59-78
-
-
Prokhorenko, V.1
Choo, K.-K.R.2
Ashman, H.3
|