IVD: Automatic Learning and Enforcement of Authorization Rules in Online Social Networks
暂无分享,去创建一个
Yuan Tian | Patrick Tague | Ioannis Papagiannis | Paul Marinescu | Chad Parry | Marjori Pomarole | Marjori Pomarole | Yuan Tian | P. Tague | P. Marinescu | I. Papagiannis | Chad Parry
[1] Alessandro Orso,et al. Using positive tainting and syntax-aware evaluation to counter SQL injection attacks , 2006, SIGSOFT '06/FSE-14.
[2] Pete Wyckoff,et al. Hive - A Warehousing Solution Over a Map-Reduce Framework , 2009, Proc. VLDB Endow..
[3] Vitaly Shmatikov,et al. SAFERPHP: finding semantic vulnerabilities in PHP applications , 2011, PLAS '11.
[4] Jennifer Widom,et al. The Lorel query language for semistructured data , 1997, International Journal on Digital Libraries.
[5] Xiaowei Li,et al. BLOCK: a black-box approach for detection of state violation attacks towards web applications , 2011, ACSAC '11.
[6] Sherif Sakr,et al. G-SPARQL: a hybrid engine for querying large attributed graphs , 2012, CIKM.
[7] Dimitris Gritzalis,et al. Hunting Application-Level Logical Errors , 2012, ESSoS.
[8] Zhendong Su,et al. Static Detection of Access Control Vulnerabilities in Web Applications , 2011, USENIX Security Symposium.
[9] Hui Ding,et al. TAO: Facebook's Distributed Data Store for the Social Graph , 2013, USENIX Annual Technical Conference.
[10] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[11] Christopher Krügel,et al. Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis , 2007, NDSS.
[12] Robert Karl,et al. Holistic configuration management at Facebook , 2015, SOSP.
[13] Stephen McCamant,et al. The Daikon system for dynamic detection of likely invariants , 2007, Sci. Comput. Program..
[14] Christopher Krügel,et al. Anomaly detection of web-based attacks , 2003, CCS '03.
[15] Giovanni Vigna,et al. Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications , 2007, RAID.
[16] XiaoFeng Wang,et al. InteGuard: Toward Automatic Protection of Third-Party Web Service Integrations , 2013, NDSS.
[17] V. N. Venkatakrishnan,et al. WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction , 2011, CCS '11.
[18] Zheng Shao,et al. Data warehousing and analytics infrastructure at facebook , 2010, SIGMOD Conference.
[19] Giovanni Vigna,et al. Multi-module vulnerability analysis of web-based applications , 2007, CCS '07.
[20] Mahadev Konar,et al. ZooKeeper: Wait-free Coordination for Internet-scale Systems , 2010, USENIX ATC.
[21] Davide Balzarotti,et al. Toward Black-Box Detection of Logic Flaws in Web Applications , 2014, NDSS.
[22] Christopher Leckie,et al. Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters , 2005, ACSC.
[23] Giovanni Vigna,et al. A Learning-Based Approach to the Detection of SQL Attacks , 2005, DIMVA.
[24] Vitaly Shmatikov,et al. RoleCast: finding missing security checks when you do not know what checks are , 2011, OOPSLA '11.
[25] Sin Yeung Lee,et al. Learning Fingerprints for a Database Intrusion Detection System , 2002, ESORICS.
[26] Miguel Castro,et al. Vigilante: end-to-end containment of internet worms , 2005, SOSP '05.
[27] Peter T. Wood,et al. Query languages for graph databases , 2012, SGMD.
[28] James Newsom,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software, Network and Distributed System Security Symposium Conference Proceedings : 2005 , 2005 .
[29] Hairong Kuang,et al. The Hadoop Distributed File System , 2010, 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST).
[30] John Law,et al. Robust Statistics—The Approach Based on Influence Functions , 1986 .
[31] Vitaly Shmatikov,et al. Fix Me Up: Repairing Access-Control Bugs in Web Applications , 2013, NDSS.
[32] Christopher Krügel,et al. ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities , 2015, USENIX Security Symposium.
[33] Christopher Krügel,et al. Toward Automated Detection of Logic Vulnerabilities in Web Applications , 2010, USENIX Security Symposium.
[34] Yuriy Brun,et al. Bandsaw: Log-powered test scenario generation for distributed systems , 2011, SOSP 2011.