Search-Based Security Testing of Web Applications
暂无分享,去创建一个
[1] Andreas Zeller,et al. Mining behavior models from enterprise web applications , 2013, ESEC/FSE 2013.
[2] Martin Burger,et al. WebMate: Generating Test Cases for Web 2.0 , 2013, SWQD.
[3] Andreas Zeller,et al. Fuzzing with Code Fragments , 2012, USENIX Security Symposium.
[4] A. Deursen,et al. Crawling Ajax-Based Web Applications through Dynamic Analysis of User Interface State Changes , 2012, TWEB.
[5] Sanjay Rawat,et al. Offset-Aware Mutation Based Fuzzing for Buffer Overflow Vulnerabilities: Few Preliminary Results , 2011, 2011 IEEE Fourth International Conference on Software Testing, Verification and Validation Workshops.
[6] John C. Mitchell,et al. State of the Art: Automated Black-Box Web Application Vulnerability Testing , 2010, 2010 IEEE Symposium on Security and Privacy.
[7] Michael D. Ernst,et al. HAMPI: a solver for string constraints , 2009, ISSTA.
[8] Michael D. Ernst,et al. Automatic creation of SQL Injection and cross-site scripting attacks , 2009, 2009 IEEE 31st International Conference on Software Engineering.
[9] Alessandro Orso,et al. Penetration Testing with Improved Input Vector Identification , 2009, 2009 International Conference on Software Testing Verification and Validation.
[10] Angelos Stavrou,et al. SQLProb: a proxy-based architecture towards preventing SQL injection attacks , 2009, SAC '09.
[11] Laurie A. Williams,et al. On automated prepared statement generation to remove SQL injection vulnerabilities , 2009, Inf. Softw. Technol..
[12] Giuliano Antoniol,et al. Detecting buffer overflow via automatic test input data generation , 2008, Comput. Oper. Res..
[13] Monica S. Lam,et al. Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking , 2008, USENIX Security Symposium.
[14] Christopher Krügel,et al. Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[15] Kenji Kono,et al. Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Injection , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[16] Ryan Cunningham,et al. Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[17] Giuliano Antoniol,et al. Automated Protection of PHP Applications Against SQL-injection Attacks , 2007, 11th European Conference on Software Maintenance and Reengineering (CSMR'07).
[18] Alessandro Orso,et al. Using positive tainting and syntax-aware evaluation to counter SQL injection attacks , 2006, SIGSOFT '06/FSE-14.
[19] Christopher Krügel,et al. SecuBat: a web vulnerability scanner , 2006, WWW '06.
[20] Alessandro Orso,et al. AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks , 2005, ASE.
[21] Tadeusz Pietraszek,et al. Defending Against Injection Attacks Through Context-Sensitive String Evaluation , 2005, RAID.
[22] Benjamin Livshits,et al. Finding Security Vulnerabilities in Java Applications with Static Analysis , 2005, USENIX Security Symposium.
[23] Giovanni Vigna,et al. A Learning-Based Approach to the Detection of SQL Attacks , 2005, DIMVA.
[24] Anh Nguyen-Tuong,et al. Automatically Hardening Web Applications Using Precise Tainting , 2005, SEC.
[25] R.A. McClure,et al. SQL DOM: compile time checking of dynamic SQL statements , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..
[26] S. Rai,et al. Safe query objects: statically typed objects as remotely executable queries , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..
[27] Shih-Kun Huang,et al. Web application security assessment by fault injection and behavior monitoring , 2003, WWW '03.
[28] Laurie Williams,et al. SQLUnitGen: SQL Injection Testing Using Static and Dynamic Analysis , 2006 .