메뉴 건너뛰기




Volumn 11, Issue 10, 2016, Pages 2215-2226

Intent-Based Extensible Real-Time PHP Supervision Framework

Author keywords

intent based; PHP; real time supervision; web application security

Indexed keywords

NETWORK SECURITY; WEBSITES; WORLD WIDE WEB; XML;

EID: 84979928325     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2016.2569063     Document Type: Article
Times cited : (18)

References (34)
  • 2
    • 33749823368 scopus 로고    scopus 로고
    • Static approximation of dynamically generated Web pages
    • Y. Minamide, "Static approximation of dynamically generated Web pages," in Proc. 14th Int. Conf. World Wide Web (WWW), 2005, pp. 432-441.
    • (2005) Proc. 14th Int. Conf. World Wide Web (WWW) , pp. 432-441
    • Minamide, Y.1
  • 4
    • 80053079139 scopus 로고    scopus 로고
    • Static enforcement of Web application integrity through strong typing
    • W. Robertson and G. Vigna, "Static enforcement of Web application integrity through strong typing," in Proc. 18th Conf. USENIX Secur. Symp. (SSYM), 2009, pp. 283-298.
    • (2009) Proc. 18th Conf. USENIX Secur. Symp. (SSYM) , pp. 283-298
    • Robertson, W.1    Vigna, G.2
  • 6
    • 56149111605 scopus 로고    scopus 로고
    • Domain-specific languages and program generation with meta-AspectJ
    • S. S. Huang, D. Zook, and Y. Smaragdakis, "Domain-specific languages and program generation with meta-AspectJ," ACM Trans. Softw. Eng. Methodol., vol. 18, no. 2, 2008, Art. no. 6.
    • (2008) ACM Trans. Softw. Eng. Methodol. , vol.18 , Issue.2
    • Huang, S.S.1    Zook, D.2    Smaragdakis, Y.3
  • 7
    • 84886397020 scopus 로고    scopus 로고
    • Path sensitive static analysis of Web applications for remote code execution vulnerability detection
    • May
    • Y. Zheng and X. Zhang, "Path sensitive static analysis of Web applications for remote code execution vulnerability detection," in Proc. Int. Conf. Softw. Eng. (ICSE), May 2013, pp. 652-661.
    • (2013) Proc. Int. Conf. Softw. Eng. (ICSE) , pp. 652-661
    • Zheng, Y.1    Zhang, X.2
  • 9
    • 80755187784 scopus 로고    scopus 로고
    • SCRIPTGARD: Automatic context-sensitive sanitization for large-scale legacy Web applications
    • P. Saxena, D. Molnar, and B. Livshits, "SCRIPTGARD: Automatic context-sensitive sanitization for large-scale legacy Web applications," in Proc. 18th ACM Conf. Comput. Commun. Secur. (CCS), 2011, pp. 601-614.
    • (2011) Proc. 18th ACM Conf. Comput. Commun. Secur. (CCS) , pp. 601-614
    • Saxena, P.1    Molnar, D.2    Livshits, B.3
  • 12
    • 84979927986 scopus 로고    scopus 로고
    • accessed on Jan. 5, 2016. [Online]
    • S. Cass. (2015). The 2015 Top Ten Programming Languages, accessed on Jan. 5, 2016. [Online]. Available: http://spectrum. ieee.org/computing/software/the-2015-top-ten-programming-languages
    • (2015) The 2015 Top Ten Programming Languages
    • Cass, S.1
  • 13
    • 33751027156 scopus 로고    scopus 로고
    • Pixy: A static analysis tool for detecting Web application vulnerabilities
    • Oakland, CA, USA, May
    • N. Jovanovic, C. Kruegel, and E. Kirda, "Pixy: A static analysis tool for detecting Web application vulnerabilities," in Proc. 27th IEEE Symp. Secur. Privacy, Oakland, CA, USA, May 2006, pp. 263-266.
    • (2006) Proc. 27th IEEE Symp. Secur. Privacy , pp. 263-266
    • Jovanovic, N.1    Kruegel, C.2    Kirda, E.3
  • 14
    • 84951790264 scopus 로고    scopus 로고
    • Web application protection techniques: A taxonomy
    • Jan.
    • V. Prokhorenko, K.-K. R. Choo, and H. Ashman, "Web application protection techniques: A taxonomy," J. Netw. Comput. Appl., vol. 60, pp. 95-112, Jan. 2016.
    • (2016) J. Netw. Comput. Appl. , vol.60 , pp. 95-112
    • Prokhorenko, V.1    Choo, K.-K.R.2    Ashman, H.3
  • 15
    • 84942773506 scopus 로고    scopus 로고
    • Semantic differential repair for input validation and sanitization
    • New York, NY, USA
    • M. Alkhalaf, A. Aydin, and T. Bultan, "Semantic differential repair for input validation and sanitization," in Proc. Int. Symp. Softw. Test. Anal. (ISSTA), New York, NY, USA, 2014, pp. 225-236.
    • (2014) Proc. Int. Symp. Softw. Test. Anal. (ISSTA) , pp. 225-236
    • Alkhalaf, M.1    Aydin, A.2    Bultan, T.3
  • 16
    • 84922513946 scopus 로고    scopus 로고
    • Detection model for SQL injection attack: An approach for preventing a Web application from the SQL injection attack
    • Apr.
    • G. Buja, K. B. A. Jalil, F. B. H. M. Ali, and T. F. A. Rahman, "Detection model for SQL injection attack: An approach for preventing a Web application from the SQL injection attack," in Proc. IEEE Symp. Comput. Appl. Ind. Electron. (ISCAIE), Apr. 2014, pp. 60-64.
    • (2014) Proc. IEEE Symp. Comput. Appl. Ind. Electron. (ISCAIE) , pp. 60-64
    • Buja, G.1    Jalil, K.B.A.2    Ali, F.B.H.M.3    Rahman, T.F.A.4
  • 17
    • 84979927246 scopus 로고    scopus 로고
    • accessed on Jan. 5, 2016. Online
    • BAXTEP, accessed on Jan. 5, 2016. [Online]. Available: https://code. google.com/archive/p/baxtep
  • 22
    • 84951835679 scopus 로고    scopus 로고
    • accessed on Jun. 20, 2016. [Online]
    • Forbes. (2013). Wordpress Under Attack: How to Avoid The Coming Botnet, accessed on Jun. 20, 2016. [Online]. Available: http://www.forbes. com/sites/anthonykosner/2013/04/13/wordpress-under-attack-how-toavoid-the-coming-botnet/
    • (2013) Wordpress under Attack: How to Avoid the Coming Botnet
  • 24
    • 84987601526 scopus 로고    scopus 로고
    • accessed on Jun. 20, 2016. [Online]
    • Ars Technica. (2015). Just-Released WordPress 0day Makes it Easy to Hijack Millions of Web-Sites, accessed on Jun. 20, 2016. [Online]. Available: http://arstechnica.com/security/2015/04/justreleased-wordpress-0day-makes-it-easy-to-hijack-millions-of-websites/
    • (2015) Just-Released WordPress 0day Makes It Easy to Hijack Millions of Web-Sites
  • 25
    • 84951746648 scopus 로고    scopus 로고
    • accessed on Jun. 20, 2016. [Online]
    • Wired. (2012). Black Hat is Over, But SQL Injection Attacks Persist, accessed on Jun. 20, 2016. [Online]. Available: http://www. wired.com/2012/08/black-hat-sql-injection/
    • (2012) Black Hat Is Over, but SQL Injection Attacks Persist
  • 26
    • 84901229096 scopus 로고    scopus 로고
    • A survey on server-side approaches to securing Web applications
    • X. Li and Y. Xue, "A survey on server-side approaches to securing Web applications," ACM Comput. Surv., vol. 46, no. 4, 2014, Art. no. 54.
    • (2014) ACM Comput. Surv. , vol.46 , Issue.4
    • Li, X.1    Xue, Y.2
  • 27
    • 84979887398 scopus 로고    scopus 로고
    • accessed on Jan. 5, 2016. [Online]
    • ZoneMinder, accessed on Jan. 5, 2016. [Online]. Available: http://zoneminder.com
  • 28
    • 84979907148 scopus 로고    scopus 로고
    • accessed on Jan. 5, 2016. [Online]
    • PHP-CFG, accessed on Jan. 5, 2016. [Online]. Available: https://github.com/ircmaxell/php-cfg
    • PHP-CFG
  • 29
    • 72949084588 scopus 로고    scopus 로고
    • SQLProb: A proxybased architecture towards preventing SQL injection attacks
    • A. Liu, Y. Yuan, D. Wijesekera, and A. Stavrou, "SQLProb: A proxybased architecture towards preventing SQL injection attacks," in Proc. ACM Symp. Appl. Comput. (SAC), 2009, pp. 2054-2061.
    • (2009) Proc. ACM Symp. Appl. Comput. (SAC) , pp. 2054-2061
    • Liu, A.1    Yuan, Y.2    Wijesekera, D.3    Stavrou, A.4
  • 30
    • 78650896178 scopus 로고    scopus 로고
    • Document structure integrity: A robust basis for cross-site scripting defense
    • Y. Nadji, P. Saxena, and D. Song, "Document structure integrity: A robust basis for cross-site scripting defense," in Proc. NDSS, 2009, p. 20.
    • (2009) Proc. NDSS , pp. 20
    • Nadji, Y.1    Saxena, P.2    Song, D.3
  • 34
    • 84963877054 scopus 로고    scopus 로고
    • Context-oriented Web application protection model
    • Jul.
    • V. Prokhorenko, K.-K. R. Choo, and H. Ashman, "Context-oriented Web application protection model," Appl. Math. Comput., vol. 285, pp. 59-78, Jul. 2016.
    • (2016) Appl. Math. Comput. , vol.285 , pp. 59-78
    • Prokhorenko, V.1    Choo, K.-K.R.2    Ashman, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.