jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications
暂无分享,去创建一个
Eric Bodden | Christian Rossow | Giancarlo Pellegrino | Constantin Tschürtz | C. Rossow | E. Bodden | Giancarlo Pellegrino | Constantin Tschürtz
[1] Giovanni Vigna,et al. Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners , 2010, DIMVA.
[2] Arie van Deursen,et al. Crawling Ajax-Based Web Applications through Dynamic Analysis of User Interface State Changes , 2012, TWEB.
[3] Christopher Krügel,et al. Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner , 2012, USENIX Security Symposium.
[4] John C. Mitchell,et al. State of the Art: Automated Black-Box Web Application Vulnerability Testing , 2010, 2010 IEEE Symposium on Security and Privacy.
[5] Jun Sun,et al. AUTHSCAN: Automatic Extraction of Web Authentication Protocols from Implementations , 2013, NDSS.
[6] Yuchen Zhou,et al. SSOScan: Automated Testing of Web Applications for Single Sign-On Vulnerabilities , 2014, USENIX Security Symposium.
[7] Jingyu Zhou,et al. An Analysis of URLs Generated from JavaScript Code , 2012, 2012 IEEE/ACIS 11th International Conference on Computer and Information Science.
[8] Frank Tip,et al. A framework for automated testing of javascript web applications , 2011, 2011 33rd International Conference on Software Engineering (ICSE).