Code Injection Attacks on HTML5-based Mobile Apps: Characterization, Detection and Mitigation
暂无分享,去创建一个
[1] Christopher Krügel,et al. Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications , 2014, NDSS.
[2] Jan Vitek,et al. An analysis of the dynamic behavior of JavaScript programs , 2010, PLDI '10.
[3] Marco Pistoia,et al. Saving the world wide web from vulnerable JavaScript , 2011, ISSTA '11.
[4] Tadeusz Pietraszek,et al. Defending Against Injection Attacks Through Context-Sensitive String Evaluation , 2005, RAID.
[5] Ben Stock,et al. 25 million flows later: large-scale detection of DOM-based XSS , 2013, CCS.
[6] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[7] Jörg Schwenk,et al. mXSS attacks: attacking well-secured web-applications by using innerHTML mutations , 2013, CCS.
[8] Sid Stamm,et al. Reining in the web with content security policy , 2010, WWW '10.
[9] Benjamin Livshits,et al. Rozzle: De-cloaking Internet Malware , 2012, 2012 IEEE Symposium on Security and Privacy.
[10] Xuxian Jiang,et al. A Static Assurance Analysis of Android Applications , 2013 .
[11] Wenliang Du,et al. Contego: Capability-Based Access Control for Web Browsers - (Short Paper) , 2011, TRUST.
[12] Steve Hanna,et al. FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications , 2010, NDSS.
[13] Alexander Aiken,et al. Static Detection of Security Vulnerabilities in Scripting Languages , 2006, USENIX Security Symposium.
[14] Mu Zhang,et al. AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications , 2014, NDSS.
[15] Anh Nguyen-Tuong,et al. Automatically Hardening Web Applications Using Precise Tainting , 2005, SEC.
[16] David A. Wagner,et al. Bifocals: Analyzing WebView Vulnerabilities in Android Applications , 2013, WISA.
[17] Benjamin Livshits,et al. SCRIPTGARD: automatic context-sensitive sanitization for large-scale legacy web applications , 2011, CCS '11.
[18] Ngu Phuc Huy,et al. Evaluation of mobile app paradigms , 2012, MoMM '12.
[19] Benjamin Livshits,et al. Fast and Precise Sanitizer Analysis with BEK , 2011, USENIX Security Symposium.
[20] Rui Wang,et al. Unauthorized origin crossing on mobile platforms: threats and mitigation , 2013, CCS.
[21] Thorsten Holz,et al. IceShield: Detection and Mitigation of Malicious Websites with a Frozen DOM , 2011, RAID.
[22] Wenliang Du,et al. Fine-Grained Access Control for HTML5-Based Mobile Applications in Android , 2013, ISC.
[23] Latifur Khan,et al. SMV-Hunter: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps , 2014, NDSS.
[24] Dawn Xiaodong Song,et al. Towards Client-side HTML Security Policies , 2011, HotSec.
[25] Giovanni Vigna,et al. Detecting malicious JavaScript code in Mozilla , 2005, 10th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'05).
[26] Christopher Krügel,et al. Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis , 2007, NDSS.
[27] Christopher Krügel,et al. Pixy: a static analysis tool for detecting Web application vulnerabilities , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[28] Dawn Xiaodong Song,et al. Context-sensitive auto-sanitization in web templating languages using type qualifiers , 2011, CCS '11.
[29] Vitaly Shmatikov,et al. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks , 2014, NDSS.
[30] Yajin Zhou,et al. Systematic Detection of Capability Leaks in Stock Android Smartphones , 2012, NDSS.
[31] Benjamin Livshits,et al. ConScript: Specifying and Enforcing Fine-Grained Security Policies for JavaScript in the Browser , 2010, 2010 IEEE Symposium on Security and Privacy.
[32] Heng Yin,et al. Attacks on WebView in the Android system , 2011, ACSAC '11.
[33] Yen-Lin Chen,et al. DroidCIA: A Novel Detection Method of Code Injection Attacks on HTML5-Based Mobile Apps , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[34] Bernd Freisleben,et al. Why eve and mallory love android: an analysis of android SSL (in)security , 2012, CCS.
[35] Collin Jackson,et al. Regular expressions considered harmful in client-side XSS filters , 2010, WWW '10.
[36] Yuan Zhang,et al. AppIntent: analyzing sensitive data transmission in android for privacy leakage detection , 2013, CCS.
[37] Dan Boneh,et al. XCS: cross channel scripting and its impact on web applications , 2009, CCS.
[38] Wenliang Du,et al. ESCUDO: A Fine-Grained Protection Model for Web Browsers , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[39] Benjamin Livshits,et al. Practical static analysis of JavaScript applications in the presence of frameworks and libraries , 2013, ESEC/FSE 2013.
[40] Martin Paul Eve,et al. XSS Cheat Sheet , 2007 .
[41] Yajin Zhou,et al. Detecting Passive Content Leaks and Pollution in Android Applications , 2013, NDSS.
[42] Wenke Lee,et al. CHEX: statically vetting Android apps for component hijacking vulnerabilities , 2012, CCS.