Static Detection of Second-Order Vulnerabilities in Web Applications
暂无分享,去创建一个
[1] Christopher Krügel,et al. Noxes: a client-side solution for mitigating cross-site scripting attacks , 2006, SAC '06.
[2] Christopher Krügel,et al. Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[3] Giovanni Vigna,et al. Multi-module vulnerability analysis of web-based applications , 2007, CCS '07.
[4] Christopher Krügel,et al. Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis , 2007, NDSS.
[5] Xiangyu Zhang,et al. Z3-str: a z3-based string solver for web application analysis , 2013, ESEC/FSE 2013.
[6] Christopher Krügel,et al. Static analysis for detecting taint-style vulnerabilities in web applications , 2010, J. Comput. Secur..
[7] Dan Boneh,et al. XCS: cross channel scripting and its impact on web applications , 2009, CCS.
[8] Thorsten Holz,et al. Simulation of Built-in PHP Features for Precise Static Code Analysis , 2014, NDSS.
[9] Benjamin Livshits,et al. Spectator: Detection and Containment of JavaScript Worms , 2008, USENIX Annual Technical Conference.
[10] Alexander Aiken,et al. Static Detection of Security Vulnerabilities in Scripting Languages , 2006, USENIX Security Symposium.
[11] Michael D. Ernst,et al. Automatic creation of SQL Injection and cross-site scripting attacks , 2009, 2009 IEEE 31st International Conference on Software Engineering.
[12] Pavol Zavarsky,et al. Testing and assessing web vulnerability scanners for persistent SQL injection attacks , 2011, IWSEC 2011.
[13] John C. Mitchell,et al. State of the Art: Automated Black-Box Web Application Vulnerability Testing , 2010, 2010 IEEE Symposium on Security and Privacy.
[14] Xiangyu Zhang,et al. Static detection of resource contention problems in server-side scripts , 2012, 2012 34th International Conference on Software Engineering (ICSE).
[15] R. Sekar. An Efficient Black-box Technique for Defeating Web Application Attacks , 2009, NDSS.
[16] Paul Klint,et al. An empirical study of PHP feature usage , 2013, ISSTA 2013.
[17] Frank Tip,et al. Finding Bugs in Web Applications Using Dynamic Test Generation and Explicit-State Model Checking , 2010, IEEE Transactions on Software Engineering.
[18] Vitaly Shmatikov,et al. RoleCast: finding missing security checks when you do not know what checks are , 2011, OOPSLA '11.
[19] Viktor Kuncak,et al. Phantm: PHP analyzer for type mismatch , 2010, FSE '10.
[20] William K. Robertson,et al. An empirical analysis of input validation mechanisms in web applications and languages , 2012, SAC '12.
[21] Giovanni Vigna,et al. Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners , 2010, DIMVA.
[22] Amit Klein,et al. Cross Site Scripting Explained , 2002 .
[23] Vitaly Shmatikov,et al. SAFERPHP: finding semantic vulnerabilities in PHP applications , 2011, PLAS '11.
[24] Hao Chen,et al. Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks , 2009, NDSS.
[25] Alessandro Orso,et al. A Classification of SQL Injection Attacks and Countermeasures , 2006, ISSSE.
[26] Zhendong Su,et al. Static detection of cross-site scripting vulnerabilities , 2008, 2008 ACM/IEEE 30th International Conference on Software Engineering.
[27] Zhendong Su,et al. Client-Side Detection of XSS Worms by Monitoring Payload Propagation , 2009, ESORICS.
[28] Paul Klint,et al. An empirical study of PHP feature usage: a static analysis perspective , 2013, ISSTA.
[29] Dawn Xiaodong Song,et al. Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense , 2009, NDSS.
[30] Brian W. Kernighan,et al. The Practice of Programming , 1999 .
[31] Ricardo J. Rodríguez,et al. Detection of Intrusions and Malware, and Vulnerability Assessment , 2016, Lecture Notes in Computer Science.
[32] Christopher Krügel,et al. Leveraging User Interactions for In-Depth Testing of Web Applications , 2008, RAID.