CAVEAT: Facilitating interactive and secure client-side validators for ruby on rails applications
暂无分享,去创建一个
V. N. Venkatakrishnan | Lenore D. Zuck | Timothy L. Hinrichs | Daniel Ruiz | Michael Cueno | L. Zuck | V. Venkatakrishnan | Michael Cueno | Daniel Ruiz
[1] V. N. Venkatakrishnan,et al. WAVES: Automatic Synthesis of Client-Side Validation Code for Web Applications , 2012, 2012 International Conference on Cyber Security.
[2] Alessandro Orso,et al. ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies , 2012, ISSTA 2012.
[3] Clodoaldo Robledo,et al. Google Web Toolkit , 2012 .
[4] V. N. Venkatakrishnan,et al. WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction , 2011, CCS '11.
[5] Rui Wang,et al. How to Shop for Free Online -- Security Analysis of Cashier-as-a-Service Based Web Stores , 2011, 2011 IEEE Symposium on Security and Privacy.
[6] Timothy L. Hinrichs. Plato: A Compiler for Interactive Web Forms , 2011, PADL.
[7] V. N. Venkatakrishnan,et al. NoTamper: automatic blackbox detection of parameter tampering opportunities in web applications , 2010, CCS '10.
[8] Michael K. Reiter,et al. Server-side verification of client behavior in online games , 2011, TSEC.
[9] Benjamin Livshits,et al. Ripley: Automatically Securing Distributed Web Applications Through Replicated Execution , 2008 .
[10] Michael Bächle,et al. Ruby on Rails , 2006, Softwaretechnik-Trends.