Static analysis for detecting taint-style vulnerabilities in web applications
暂无分享,去创建一个
[1] Acm Sigsoft,et al. Proceedings of the 2001 ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering : PASTE '01, Snowbird, Utah, USA, June 18-19, 2001 , 2001 .
[2] David A. Wagner,et al. Finding User/Kernel Pointer Bugs with Type Inference , 2004, USENIX Security Symposium.
[3] Alessandro Orso,et al. AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks , 2005, ASE.
[4] Yanhong A. Liu,et al. Incrementalization across object abstraction , 2005, OOPSLA '05.
[5] Monica S. Lam,et al. Cloning-based context-sensitive pointer alias analysis using binary decision diagrams , 2004, PLDI '04.
[6] Yasuhiko Minamide,et al. Static approximation of dynamically generated Web pages , 2005, WWW '05.
[7] Benjamin Livshits,et al. Finding Security Vulnerabilities in Java Applications with Static Analysis , 2005, USENIX Security Symposium.
[8] Alfred V. Aho,et al. Compilers: Principles, Techniques, and Tools , 1986, Addison-Wesley series in computer science / World student series edition.
[9] Alexander Aiken,et al. A theory of type qualifiers , 1999, PLDI '99.
[10] Shih-Kun Huang,et al. Web application security assessment by fault injection and behavior monitoring , 2003, WWW '03.
[11] Christopher Krügel,et al. Pixy: a static analysis tool for detecting Web application vulnerabilities , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[12] Zhendong Su,et al. The essence of command injection attacks in web applications , 2006, POPL '06.
[13] Dawson R. Engler,et al. Checking system rules using system-specific, programmer-written compiler extensions , 2000, OSDI.
[14] Tadeusz Pietraszek,et al. Defending Against Injection Attacks Through Context-Sensitive String Evaluation , 2005, RAID.
[15] David A. Wagner,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Detecting Format String Vulnerabilities with Type Qualifiers , 2001 .
[16] Christopher Krügel,et al. Noxes: a client-side solution for mitigating cross-site scripting attacks , 2006, SAC '06.
[17] Lars Ole Andersen,et al. Program Analysis and Specialization for the C Programming Language , 2005 .
[18] Larry Wall,et al. Programming Perl , 1991 .
[19] D. T. Lee,et al. Verifying Web applications using bounded model checking , 2004, International Conference on Dependable Systems and Networks, 2004.
[20] Mark N. Wegman,et al. Analysis of pointers and structures , 1990, SIGP.
[21] Michael Hind,et al. Pointer analysis: haven't we solved this problem yet? , 2001, PASTE '01.
[22] Flemming Nielson,et al. Principles of Program Analysis , 1999, Springer Berlin Heidelberg.
[23] Günter Pomaska,et al. PHP Hypertext Preprocessor , 2012 .
[24] Steven S. Muchnick,et al. Advanced Compiler Design and Implementation , 1997 .
[25] Gary A. Kildall,et al. A unified approach to global program optimization , 1973, POPL.
[26] Aske Simon Christensen,et al. Precise Analysis of String Expressions , 2003, SAS.
[27] D. T. Lee,et al. Securing web application code by static analysis and runtime protection , 2004, WWW '04.
[28] Michael I. Schwartzbach,et al. Static Program Analysis , 2011, Encyclopedia of Cryptography and Security.
[29] Dawson R. Engler,et al. Using programmer-written compiler extensions to catch security holes , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[30] Anh Nguyen-Tuong,et al. Automatically Hardening Web Applications Using Precise Tainting , 2005, SEC.
[31] Barbara G. Ryder,et al. A safe approximate algorithm for interprocedural aliasing , 1992, PLDI '92.
[32] Alexander Aiken,et al. Static Detection of Security Vulnerabilities in Scripting Languages , 2006, USENIX Security Symposium.
[33] Christopher Krügel,et al. Precise alias analysis for static detection of web application vulnerabilities , 2006, PLAS '06.
[34] Monica S. Lam,et al. Efficient context-sensitive pointer analysis for C programs , 1995, PLDI '95.
[35] Bjarne Steensgaard,et al. Points-to analysis in almost linear time , 1996, POPL '96.
[36] Zhendong Su,et al. Sound and precise analysis of web applications for injection vulnerabilities , 2007, PLDI '07.
[37] Manuvir Das,et al. Unification-based pointer analysis with directional assignments , 2000, PLDI '00.
[38] Dawson R. Engler,et al. Bugs as deviant behavior: a general approach to inferring errors in systems code , 2001, SOSP.