Tài liệu tham khảo |
Loại |
Chi tiết |
[1] Hisham Alasmary et al. “Analyzing and Detecting Emerging Internet of Things Mal- ware: A Graph-Based Approach”. In: IEEE Internet of Things Journal 6.5 (2019), pp. 8977–8988 |
Sách, tạp chí |
Tiêu đề: |
Analyzing and Detecting Emerging Internet of Things Mal-ware: A Graph-Based Approach”. In: "IEEE Internet of Things Journal |
Tác giả: |
Hisham Alasmary et al. “Analyzing and Detecting Emerging Internet of Things Mal- ware: A Graph-Based Approach”. In: IEEE Internet of Things Journal 6.5 |
Năm: |
2019 |
|
[2] M. Backes et al. “Efficient and Flexible Discovery of PHP Application Vulnera- bilities”. In: 2017 IEEE European Symposium on Security and Privacy (EuroS P).2017, pp. 334–349 |
Sách, tạp chí |
Tiêu đề: |
Efficient and Flexible Discovery of PHP Application Vulnera-bilities”. In: "2017 IEEE European Symposium on Security and Privacy (EuroS P) |
|
[3] Michael Backes et al. “Efficient and Flexible Discovery of PHP Application Vulner- abilities”. In: 2017 IEEE European Symposium on Security and Privacy (EuroS P).2017, pp. 334–349 |
Sách, tạp chí |
Tiêu đề: |
Efficient and Flexible Discovery of PHP Application Vulner-abilities”. In: "2017 IEEE European Symposium on Security and Privacy (EuroS P) |
|
[4] D. Balzarotti et al. “Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications”. In: 2008 IEEE Symposium on Security and Pri- vacy (sp 2008). 2008, pp. 387–401 |
Sách, tạp chí |
Tiêu đề: |
Saner: Composing Static and Dynamic Analysis to ValidateSanitization in Web Applications”. In: "2008 IEEE Symposium on Security and Pri-vacy (sp 2008) |
|
[5] Z. Bilgin et al. “Vulnerability Prediction From Source Code Using Machine Learn- ing”. In: IEEE Access 8 (2020), pp. 150672–150684 |
Sách, tạp chí |
Tiêu đề: |
Vulnerability Prediction From Source Code Using Machine Learn-ing”. In: "IEEE Access |
Tác giả: |
Z. Bilgin et al. “Vulnerability Prediction From Source Code Using Machine Learn- ing”. In: IEEE Access 8 |
Năm: |
2020 |
|
[6] Deepayan Chakrabarti. “Graph Mining”. In: Encyclopedia of Machine Learning.Ed. by Claude Sammut and Geoffrey I. Webb. Boston, MA: Springer US, 2010, pp. 469–471. url: https://doi.org/10.1007/978-0-387-30164-8_350 |
Sách, tạp chí |
Tiêu đề: |
Graph Mining”. In: "Encyclopedia of Machine Learning |
|
[7] Hong Cheng et al. “Discriminative Frequent Pattern Analysis for Effective Classifi- cation”. In: 2007 IEEE 23rd International Conference on Data Engineering (2007), pp. 716–725 |
Sách, tạp chí |
Tiêu đề: |
Discriminative Frequent Pattern Analysis for Effective Classifi-cation”. In:"2007 IEEE 23rd International Conference on Data Engineering |
Tác giả: |
Hong Cheng et al. “Discriminative Frequent Pattern Analysis for Effective Classifi- cation”. In: 2007 IEEE 23rd International Conference on Data Engineering |
Năm: |
2007 |
|
[8] J. Dahse. “RIPS-A static source code analyser for vulnerabilities in PHP scripts”.In: 2010 |
Sách, tạp chí |
Tiêu đề: |
RIPS-A static source code analyser for vulnerabilities in PHP scripts |
|
[9] Johannes Dahse. “Static detection of complex vulnerabilities in modern PHP appli- cations”. PhD thesis. Ruhr University Bochum, 2016. url: http://hss-opus.ub.ruhr-uni-bochum.de/opus4/frontdoor/index/index/docId/4791 |
Sách, tạp chí |
Tiêu đề: |
Static detection of complex vulnerabilities in modern PHP appli-cations |
|
[10] Yong Fang et al. “TAP: A static analysis model for PHP vulnerabilities based on token and deep learning technology”. In: PLOS ONE 14 (Nov. 2019), e0225196 |
Sách, tạp chí |
Tiêu đề: |
TAP: A static analysis model for PHP vulnerabilities based ontoken and deep learning technology”. In: "PLOS ONE |
|
[11] Jeanne Ferrante, Karl J. Ottenstein, and Joe D. Warren. “The Program Dependence Graph and Its Use in Optimization”. In: ACM Trans. Program. Lang. Syst. 9.3 (1987), pp. 319–349. url: https://doi.org/10.1145/24039.24041 |
Sách, tạp chí |
Tiêu đề: |
The Program DependenceGraph and Its Use in Optimization”. In: "ACM Trans. Program. Lang. Syst |
Tác giả: |
Jeanne Ferrante, Karl J. Ottenstein, and Joe D. Warren. “The Program Dependence Graph and Its Use in Optimization”. In: ACM Trans. Program. Lang. Syst. 9.3 |
Năm: |
1987 |
|
[12] FreeBSD : phpMyAdmin – Multiple security vulnerabilities. https://www.tenable.com/plugins/nessus/66210. Truy cập lần cuối: Tháng 7/2021 |
Sách, tạp chí |
Tiêu đề: |
FreeBSD : phpMyAdmin – Multiple security vulnerabilities |
|
[13] Joern’s documentation. https://joern.readthedocs.io/en/latest/databaseOverview.html. Truy cập lần cuối: Tháng 7/2021 |
Sách, tạp chí |
Tiêu đề: |
Joern’s documentation |
|
[14] Nenad Jovanovic, Christopher Kruegel, and Engin Kirda. “Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)”. In: Proceedings of the 2006 IEEE Symposium on Security and Privacy. 2006, pp. 258–263. url : https://doi.org/10.1109/SP.2006.29 |
Sách, tạp chí |
Tiêu đề: |
Pixy: A Static AnalysisTool for Detecting Web Application Vulnerabilities (Short Paper)”. In:"Proceedingsof the 2006 IEEE Symposium on Security and Privacy |
|
[15] Jorrit Kronjee, Arjen Hommersom, and Harald Vranken. “Discovering software vul- nerabilities using data-flow analysis and machine learning”. In: Aug. 2018, pp. 1–10 |
Sách, tạp chí |
Tiêu đề: |
Discovering software vul-nerabilities using data-flow analysis and machine learning |
|
[16] Xin Li et al. “Automated Vulnerability Detection in Source Code Using Minimum Intermediate Representation Learning”. In: Applied Sciences 10 (2020). url: https://www.mdpi.com/2076-3417/10/5/1692 |
Sách, tạp chí |
Tiêu đề: |
Automated Vulnerability Detection in Source Code Using MinimumIntermediate Representation Learning”. In:"Applied Sciences |
Tác giả: |
Xin Li et al. “Automated Vulnerability Detection in Source Code Using Minimum Intermediate Representation Learning”. In: Applied Sciences 10 |
Năm: |
2020 |
|
[17] ZhanJun Li and Yan Shao. “A Survey of Feature Selection for Vulnerability Pre- diction Using Feature-Based Machine Learning”. In: Proceedings of the 2019 11th International Conference on Machine Learning and Computing. 2019, pp. 36–42 |
Sách, tạp chí |
Tiêu đề: |
A Survey of Feature Selection for Vulnerability Pre-diction Using Feature-Based Machine Learning”. In: "Proceedings of the 2019 11thInternational Conference on Machine Learning and Computing |
|
[18] Zhen Li et al. “VulDeePecker: A Deep Learning-Based System for Vulnerability Detection”. In: Jan. 2018 |
Sách, tạp chí |
Tiêu đề: |
VulDeePecker: A Deep Learning-Based System for VulnerabilityDetection |
|
[19] Michael Martin and Monica S. Lam. “Automatic Generation of XSS and SQL In- jection Attacks with Goal-Directed Model Checking”. In: Proceedings of the 17th Conference on Security Symposium. SS’08. 2008, pp. 31–43 |
Sách, tạp chí |
Tiêu đề: |
Automatic Generation of XSS and SQL In-jection Attacks with Goal-Directed Model Checking”. In: "Proceedings of the 17thConference on Security Symposium |
|
[20] Michael Martin and Monica S. Lam. “Automatic Generation of XSS and SQL In- jection Attacks with Goal-Directed Model Checking”. In: Proceedings of the 17th Conference on Security Symposium. 2008, pp. 31–43 |
Sách, tạp chí |
Tiêu đề: |
Automatic Generation of XSS and SQL In-jection Attacks with Goal-Directed Model Checking”. In: "Proceedings of the 17thConference on Security Symposium |
|