Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications
暂无分享,去创建一个
Engin Kirda | Marco Balduzzi | Davide Balzarotti | Carmen Torrano Gimenez | E. Kirda | D. Balzarotti | Marco Balduzzi
[1] Roy T. Fielding,et al. Uniform Resource Identifier (URI): Generic Syntax , 2005, RFC.
[2] Collin Jackson,et al. Robust defenses for cross-site request forgery , 2008, CCS.
[3] John C. Mitchell,et al. State of the Art: Automated Black-Box Web Application Vulnerability Testing , 2010, 2010 IEEE Symposium on Security and Privacy.
[4] Norman Hardy,et al. The Confused Deputy: (or why capabilities might have been invented) , 1988, OPSR.
[5] Shih-Kun Huang,et al. Web application security assessment by fault injection and behavior monitoring , 2003, WWW '03.
[6] Christopher Krügel,et al. Preventing Cross Site Request Forgery Attacks , 2006, 2006 Securecomm and Workshops.
[7] Alexander Aiken,et al. Static Detection of Security Vulnerabilities in Scripting Languages , 2006, USENIX Security Symposium.
[8] Julie-Marie Foss,et al. Web Application Security , 2005 .
[9] Christopher Krügel,et al. SecuBat: a web vulnerability scanner , 2006, WWW '06.
[10] Richard Sharp,et al. Abstracting application-level web security , 2002, WWW.
[11] Alessandro Orso,et al. Preventing SQL injection attacks using AMNESIA , 2006, ICSE.
[12] Zhendong Su,et al. The essence of command injection attacks in web applications , 2006, POPL '06.
[13] WassermannGary,et al. The essence of command injection attacks in web applications , 2006 .
[14] Markus Jakobsson,et al. Why and How to Perform Fraud Experiments , 2008, IEEE Security & Privacy.
[15] Roy T. Fielding,et al. Uniform Resource Identifiers (URI): Generic Syntax , 1998, RFC.
[16] Collin Jackson,et al. Regular expressions considered harmful in client-side XSS filters , 2010, WWW '10.
[17] Giovanni Vigna,et al. Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners , 2010, DIMVA.
[18] Markus Jakobsson,et al. Designing ethical phishing experiments: a study of (ROT13) rOnl query features , 2006, WWW '06.
[19] Christopher Krügel,et al. Pixy: a static analysis tool for detecting Web application vulnerabilities , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[20] Christopher Krügel,et al. Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).