-
1
-
-
49949096891
-
Multi-module vulnerability analysis of webbased applications
-
D. Balzarotti, M. Cova, V. V. Felmetsger, and G. Vigna. Multi-Module Vulnerability Analysis of Webbased Applications. In Proceedings of ACM Conference on Computer and Communications Security, pages 25-35, 2007.
-
(2007)
Proceedings of ACM Conference on Computer and Communications Security
, pp. 25-35
-
-
Balzarotti, D.1
Cova, M.2
Felmetsger, V.V.3
Vigna, G.4
-
2
-
-
50249115131
-
Saner: Composing static and dynamic analysis to validate sanitization in web applications
-
D. Balzarotti, M. Cova, V. Felmetsger, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna. Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. In Proceedings of IEEE Symposium on Security and Privacy, pages 387-401, 2008.
-
(2008)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 387-401
-
-
Balzarotti, D.1
Cova, M.2
Felmetsger, V.3
Jovanovic, N.4
Kirda, E.5
Kruegel, C.6
Vigna, G.7
-
6
-
-
38149011298
-
Swaddler: An approach for the anomaly-based detection of state violations in web applications
-
M. Cova, D. Balzarotti, V. Felmetsger, and G. Vigna. Swaddler: An Approach for the Anomaly-based Detection of State Violations in Web Applications. In Proceedings of the International Symposium on Recent Advances in Intrusion Detection, pages 63-86, 2007.
-
(2007)
Proceedings of the International Symposium on Recent Advances in Intrusion Detection
, pp. 63-86
-
-
Cova, M.1
Balzarotti, D.2
Felmetsger, V.3
Vigna, G.4
-
9
-
-
0036041420
-
Bugs as deviant behavior: A general approach to inferring errors in systems code
-
D. Engler, D. Y. Chen, S. Hallem, A. Chou, and B. Chelf. Bugs as Deviant Behavior: A General Approach to Inferring Errors in Systems Code. In Proceedings of the ACM Symposium on Operating Systems Principles, pages 57-72, 2001.
-
(2001)
Proceedings of the ACM Symposium on Operating Systems Principles
, pp. 57-72
-
-
Engler, D.1
Chen, D.Y.2
Hallem, S.3
Chou, A.4
Chelf, B.5
-
10
-
-
84894088425
-
Toward automated detection of logic vulnerabilities in web applications
-
V. Felmetsger, L. Cavedon, C. Kruegel, and G. Vigna. Toward Automated Detection of Logic Vulnerabilities in Web Applications. In Proceedings of the USENIX Security Symposium, pages 143-160, 2010.
-
(2010)
Proceedings of the USENIX Security Symposium
, pp. 143-160
-
-
Felmetsger, V.1
Cavedon, L.2
Kruegel, C.3
Vigna, G.4
-
13
-
-
78649791932
-
Eliminating navigation errors in web applications via model checking and runtime enforcement of navigation state machines
-
S. Hallé, T. Ettema, C. Bunch, and T. Bultan. Eliminating Navigation Errors in Web Applications via Model Checking and Runtime Enforcement of Navigation State Machines. In Proceedings of the International Conference on Automated Software Engineering, pages 235-244, 2010.
-
(2010)
Proceedings of the International Conference on Automated Software Engineering
, pp. 235-244
-
-
Hallé, S.1
Ettema, T.2
Bunch, C.3
Bultan, T.4
-
15
-
-
85008256304
-
Hampi: A solver for string constraints
-
A. Kiezun, V. Ganesh, P. J. Guo, P. Hooimeijer, and M. D. Ernst. HAMPI: A Solver for String Constraints. In Proceedings of the International Symposium on Software Testing and Analysis, 2009.
-
(2009)
Proceedings of the International Symposium on Software Testing and Analysis
-
-
Kiezun, A.1
Ganesh, V.2
Guo, P.J.3
Hooimeijer, P.4
Ernst, M.D.5
-
16
-
-
77949371828
-
From uncertainty to belief: Inferring the specification within
-
T. Kremenek, P. Twohey, G. Back, A. Ng, and D. Engler. From Uncertainty to Belief: Inferring the Specification Within. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation, pages 12-12, 2006.
-
(2006)
Proceedings of the USENIX Symposium on Operating Systems Design and Implementation
, pp. 12
-
-
Kremenek, T.1
Twohey, P.2
Back, G.3
Ng, A.4
Engler, D.5
-
18
-
-
70450245243
-
Merlin: Specification inference for explicit information flow problems
-
B. Livshits, A. V. Nori, S. K. Rajamani, and A. Banerjee. Merlin: Specification Inference for Explicit Information Flow Problems. In Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, pages 75-86, 2009.
-
(2009)
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation
, pp. 75-86
-
-
Livshits, B.1
Nori, A.V.2
Rajamani, S.K.3
Banerjee, A.4
-
22
-
-
84871349041
-
Automatically hardening web applications using precise tainting
-
A. Nguyen-tuong, S. Guarnieri, D. Greene, J. Shirley, and D. Evans. Automatically Hardening Web Applications Using Precise Tainting. In Proceedings of the IFIP International Information Security Conference, pages 372-382, 2005.
-
(2005)
Proceedings of the IFIP International Information Security Conference
, pp. 372-382
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Shirley, J.4
Evans, D.5
-
23
-
-
70449632684
-
Clamp: Practical prevention of large-scale data leaks
-
B. Parno, J. M. McCune, D. Wendlandt, D. G. Andersen, and A. Perrig. CLAMP: Practical Prevention of Large-Scale Data Leaks. In Proceedings of the IEEE Symposium on Security and Privacy, pages 154-169, 2009.
-
(2009)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 154-169
-
-
Parno, B.1
McCune, J.M.2
Wendlandt, D.3
Andersen, D.G.4
Perrig, A.5
-
26
-
-
84894034704
-
Autoises: Automatically inferring security specifications and detecting violations
-
L. Tan, X. Zhang, X. Ma, W. Xiong, and Y. Zhou. AutoISES: Automatically Inferring Security Specifications and Detecting Violations. In Proceedings of the USENIX Security Symposium, pages 379-394, 2008.
-
(2008)
Proceedings of the USENIX Security Symposium
, pp. 379-394
-
-
Tan, L.1
Zhang, X.2
Ma, X.3
Xiong, W.4
Zhou, Y.5
-
27
-
-
70450242742
-
Taj: Effective taint analysis of web applications
-
O. Tripp, M. Pistoia, S. J. Fink, M. Sridharan, and O. Weisman. TAJ: Effective Taint Analysis of Web Applications. In Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, pages 87-97, 2009.
-
(2009)
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation
, pp. 87-97
-
-
Tripp, O.1
Pistoia, M.2
Fink, S.J.3
Sridharan, M.4
Weisman, O.5
-
31
-
-
19944365247
-
Securing web application code by static analysis and runtime protection
-
Y. wen Huang, F. Yu, C. Hang, C. hung Tsai, D. T. Lee, and S. yen Kuo. Securing Web Application Code by Static Analysis and Runtime Protection. In Proceedings of the International Conference on World Wide Web, pages 40-52, 2004.
-
(2004)
Proceedings of the International Conference on World Wide Web
, pp. 40-52
-
-
Wen Huang, Y.1
Yu, F.2
Hang, C.3
Hung Tsai, C.4
Lee, D.T.5
Yen Kuo, S.6
|