Dynamic Taint Tracking in Managed Runtimes
暂无分享,去创建一个
[1] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[2] Paul H. J. Kelly,et al. Backwards-Compatible Bounds Checking for Arrays and Pointers in C Programs , 1997, AADEBUG.
[3] Jacques Noyé,et al. Towards partially evaluating reflection in Java , 1999, PEPM '00.
[4] Chris Anley,et al. Advanced SQL Injection In SQL Server Applications , 2002 .
[5] David Litchfield,et al. SQL Server Security , 2003 .
[6] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[7] Benjamin Livshits,et al. Finding application errors and security flaws using PQL: a program query language , 2005, OOPSLA '05.
[8] Alessandro Orso,et al. AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks , 2005, ASE.
[9] Michael Franz,et al. Dynamic taint propagation for Java , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[10] Anh Nguyen-Tuong,et al. Automatically Hardening Web Applications Using Precise Tainting , 2005, SEC.
[11] D. Avots,et al. Improving software security with a C pointer analysis , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..
[12] Alessandro Orso,et al. Preventing SQL injection attacks using AMNESIA , 2006, ICSE.
[13] Benjamin Livshits,et al. Improving software insecurity with precise static and runtime analysis , 2006 .
[14] Alessandro Orso,et al. Using positive tainting and syntax-aware evaluation to counter SQL injection attacks , 2006, SIGSOFT '06/FSE-14.
[15] Christopher Krügel,et al. Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis , 2007, NDSS.
[16] Hiroshi Inamura,et al. JavaScript Instrumentation in Practice , 2008, APLAS.
[17] Christopher Krügel,et al. Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[18] Monica S. Lam,et al. Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking , 2008, USENIX Security Symposium.
[19] David A. Wagner,et al. Efficient character-level taint tracking for Java , 2009, SWS '09.
[20] R. Sekar. An Efficient Black-box Technique for Defeating Web Application Attacks , 2009, NDSS.
[21] Michael D. Ernst,et al. Automatic creation of SQL Injection and cross-site scripting attacks , 2009, 2009 IEEE 31st International Conference on Software Engineering.
[22] Benjamin Livshits,et al. Merlin: specification inference for explicit information flow problems , 2009, PLDI '09.
[23] Thomas H. Austin,et al. Efficient purely-dynamic information flow analysis , 2009, PLAS '09.
[24] Steve Hanna,et al. A Symbolic Execution Framework for JavaScript , 2010, 2010 IEEE Symposium on Security and Privacy.
[25] David A. Naumann,et al. Information Flow Monitor Inlining , 2010, 2010 23rd IEEE Computer Security Foundations Symposium.
[26] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[27] Steve Hanna,et al. FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications , 2010, NDSS.
[28] Francesco Logozzo,et al. RATA: Rapid Atomic Type Analysis by Abstract Interpretation - Application to JavaScript Optimization , 2010, CC.
[29] Somesh Jha,et al. Automating Security Mediation Placement , 2010, ESOP.
[30] David Brumley,et al. All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask) , 2010, 2010 IEEE Symposium on Security and Privacy.
[31] Benjamin Livshits,et al. AjaxScope: a platform for remotely monitoring the client-side behavior of web 2.0 applications , 2007, TWEB.
[32] Thomas H. Austin,et al. Permissive dynamic information flow analysis , 2010, PLAS '10.
[33] Dawn Xiaodong Song,et al. Context-sensitive auto-sanitization in web templating languages using type qualifiers , 2011, CCS '11.
[34] Herbert Bos,et al. Minemu: The World's Fastest Taint Tracker , 2011, RAID.
[35] Benjamin Livshits,et al. Fast and Precise Sanitizer Analysis with BEK , 2011, USENIX Security Symposium.
[36] V. N. Venkatakrishnan,et al. WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction , 2011, CCS '11.
[37] Seungyeop Han,et al. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.
[38] Benjamin Livshits,et al. SCRIPTGARD: automatic context-sensitive sanitization for large-scale legacy web applications , 2011, CCS '11.
[39] Benjamin Livshits,et al. Rozzle: De-cloaking Internet Malware , 2012, 2012 IEEE Symposium on Security and Privacy.
[40] Nikolaj Bjørner,et al. Symbolic finite state transducers: algorithms and applications , 2012, POPL '12.
[41] Alejandro Russo,et al. Towards a taint mode for cloud computing web applications , 2012, PLAS.
[42] Angelos D. Keromytis,et al. libdft: practical dynamic data flow tracking for commodity systems , 2012, VEE '12.
[43] Benjamin Livshits,et al. Towards fully automatic placement of security sanitizers and declassifiers , 2013, POPL 2013.