Exploring context-sensitive data flow analysis for early vulnerability detection
暂无分享,去创建一个
[1] David Geer. Eclipse becomes the dominant Java IDE , 2005, Computer.
[2] James A. Kupsch,et al. Manual vs. Automated Vulnerability Assessment: A Case Study , 2009 .
[3] John Viega,et al. 19 deadly sins of software security : programming flaws and how to fix them , 2005 .
[4] Lars Lundberg,et al. Evaluating the cost reduction of static code analysis for software security , 2008, PLAS '08.
[5] Rahul Telang,et al. Impact of Software Vulnerability Announcements on the Market Value of Software Vendors - an Empirical Investigation , 2005, WEIS.
[6] Mauricio A. Saca. Refactoring improving the design of existing code , 2017, 2017 IEEE 37th Central America and Panama Convention (CONCAPAN XXXVII).
[7] Edward B. Allen,et al. High false positive detection of security vulnerabilities: a case study , 2012, ACM-SE '12.
[8] Manu Sridharan,et al. TAJ: effective taint analysis of web applications , 2009, PLDI '09.
[9] Sverre H. Huseby. Innocent Code: A Security Wake-Up Call for Web Programmers , 2004 .
[10] Gregor Snelting,et al. Information Flow Control for Java Based on Path Conditions in Dependence Graphs , 2006, ISSSE.
[11] Jing Xie,et al. ASIDE: IDE support for web application security , 2011, ACSAC '11.
[12] Benjamin Livshits,et al. Finding Security Vulnerabilities in Java Applications with Static Analysis , 2005, USENIX Security Symposium.
[13] Gary McGraw,et al. Static Analysis for Security , 2004, IEEE Secur. Priv..
[14] Mira Mezini,et al. A recommendation system for exception handling code , 2012, 2012 5th International Workshop on Exception Handling (WEH).
[15] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.
[16] Armin Biere,et al. Combined Static and Dynamic Analysis , 2005, AIOOL@VMCAI.
[17] Marco Guarnieri. Security vulnerabilities detection and protection using eclipse , 2011 .
[18] Isil Dillig,et al. Precise reasoning for programs using containers , 2011, POPL '11.
[19] Gary McGraw,et al. Seven Pernicious Kingdoms: A Taxonomy of Software Security Errors , 2005, IEEE Secur. Priv..
[20] Ondrej Lhoták,et al. Context-Sensitive Points-to Analysis: Is It Worth It? , 2006, CC.
[21] Jing Xie,et al. Why do programmers make security errors? , 2011, 2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC).