Static detection of cross-site scripting vulnerabilities
暂无分享,去创建一个
[1] Alexander Aiken,et al. Static Detection of Security Vulnerabilities in Scripting Languages , 2006, USENIX Security Symposium.
[2] Christopher Krügel,et al. Precise alias analysis for static detection of web application vulnerabilities , 2006, PLAS '06.
[3] Premkumar T. Devanbu,et al. Static checking of dynamically generated queries in database applications , 2004, Proceedings. 26th International Conference on Software Engineering.
[4] Zhendong Su,et al. Sound and precise analysis of web applications for injection vulnerabilities , 2007, PLDI '07.
[5] Christopher Krügel,et al. Noxes: a client-side solution for mitigating cross-site scripting attacks , 2006, SAC '06.
[6] Helen J. Wang,et al. BrowserShield: vulnerability-driven filtering of dynamic HTML , 2006, OSDI '06.
[7] Christopher Krügel,et al. Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis , 2007, NDSS.
[8] Thomas W. Reps,et al. Precise interprocedural dataflow analysis via graph reachability , 1995, POPL '95.
[9] Aske Simon Christensen,et al. Precise Analysis of String Expressions , 2003, SAS.
[10] Tony Mobily. Cross-Site Scripting Attacks , 2004 .
[11] Benjamin Livshits,et al. Context-sensitive program analysis as database queries , 2005, PODS.
[12] Mark-Jan Nederhof,et al. Regular Approximation of Context-Free Grammars through Transformation , 2001 .
[13] Giovanni Vigna,et al. Detecting malicious JavaScript code in Mozilla , 2005, 10th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'05).
[14] Christopher Krügel,et al. Pixy: a static analysis tool for detecting Web application vulnerabilities , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[15] Benjamin C. Pierce,et al. XDuce: A Typed XML Processing Language (Preliminary Report) , 2000, WebDB.
[16] Alexander Aiken,et al. Flow-sensitive type qualifiers , 2002, PLDI '02.
[17] Michael Hicks,et al. Defeating script injection attacks with browser-enforced embedded policies , 2007, WWW '07.
[18] Richard Sproat,et al. An Efficient Compiler for Weighted Rewrite Rules , 1996, ACL.
[19] Akinori Yonezawa,et al. Regular Expression Types for Strings in a Text Processing Language , 2002, Electron. Notes Theor. Comput. Sci..
[20] Ajay Chander,et al. JavaScript instrumentation for browser security , 2007, POPL '07.
[21] Yasuhiko Minamide,et al. Static approximation of dynamically generated Web pages , 2005, WWW '05.
[22] Benjamin Livshits,et al. Finding Security Vulnerabilities in Java Applications with Static Analysis , 2005, USENIX Security Symposium.
[23] Robert A. Martin,et al. Vulnerability Type Distributions in CVE , 2007 .
[24] Mark N. Wegman,et al. Efficiently computing static single assignment form and the control dependence graph , 1991, TOPL.
[25] Jeffrey D. Ullman,et al. Introduction to Automata Theory, Languages and Computation , 1979 .
[26] D. T. Lee,et al. Securing web application code by static analysis and runtime protection , 2004, WWW '04.
[27] Monica S. Lam,et al. Cloning-based context-sensitive pointer alias analysis using binary decision diagrams , 2004, PLDI '04.
[28] Alexander Aiken,et al. A theory of type qualifiers , 1999, PLDI '99.