Data-Flow Based Analysis of Java Bytecode Vulnerability
暂无分享,去创建一个
[1] Benjamin Livshits,et al. Finding Security Vulnerabilities in Java Applications with Static Analysis , 2005, USENIX Security Symposium.
[2] Bill Venners,et al. Inside the Java Virtual Machine , 1997 .
[3] Alfred V. Aho,et al. Compilers: Principles, Techniques, and Tools , 1986, Addison-Wesley series in computer science / World student series edition.
[4] C. Chambers,et al. An Assessment of Call Graph Construction Algorithms , 2000 .
[5] Ondrej Lhoták,et al. Comparing call graphs , 2007, PASTE '07.
[6] Steven S. Muchnick,et al. Advanced Compiler Design and Implementation , 1997 .
[7] Benjamin Livshits,et al. Finding application errors and security flaws using PQL: a program query language , 2005, OOPSLA '05.
[8] Barbara G. Ryder,et al. Parameterized object sensitivity for points-to analysis for Java , 2005, TSEM.
[9] Michael Franz,et al. Dynamic taint propagation for Java , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[10] Chris Anley,et al. Advanced SQL Injection In SQL Server Applications , 2002 .