Tài liệu tham khảo |
Loại |
Chi tiết |
[7] A. Petukhov, and D. Kozlov. Detecting security vulnerabilities in Web applications using dynamic analysis with penetration testing, In OWASP AppSec Europe 2008 AppSecEU08, Belgium, 2008 |
Sách, tạp chí |
Tiêu đề: |
OWASP AppSec Europe 2008 AppSecEU08 |
|
[8] S. Bandhakavi, P. Bisht, P. Madhusudan, and V. N. Venkatakrishnan. CANDID: Preventing SQL injection attacks using dynamic candidate evaluations. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), Virginia, USA, 2007, pp. 12-24 |
Sách, tạp chí |
Tiêu đề: |
Proceedings of the ACM Conference on Computer and Communications Security (CCS) |
|
[10] Z. Su and G. Wassermann. The essence of command injection attacks in Web applications. In Proceeding. of Annual Symposium on Principles of Programming Languages (POPL), 2006, pp 372-382 |
Sách, tạp chí |
Tiêu đề: |
Proceeding. of Annual Symposium on Principles of Programming Languages (POPL) |
|
[11] Y. Xie, A. Aiken, Static detection of security vulnerabilities in scripting languages, In Proceedings of the 15th USENIX Security Symposium, 2006, pp. 179- 192 |
Sách, tạp chí |
Tiêu đề: |
Proceedings of the 15th USENIX Security Symposium |
|
[12] N.-T. Anh, S. Guarnieri, D. Greene, J. Shirley, and D. Evans. Automatically hardening Web applications using precise tainting. In IFIP Security Conference 2005, 2005 |
Sách, tạp chí |
Tiêu đề: |
IFIP Security Conference 2005 |
|
[13] V. Haldar, D. Chandra, and M. Franz. Dynamic taint propagation for Java. In Proceedings of the 21st Annual Computer Security Applications Conference, 2005 |
Sách, tạp chí |
Tiêu đề: |
Proceedings of the 21st Annual Computer Security Applications Conference |
|
[14] W. Halfond and A. Orso. AMNESIA: Analysis and monitoring for neutralizing SQL injection attacks. In Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering, California, USA, 2005, pp. 174- 183 |
Sách, tạp chí |
Tiêu đề: |
Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering |
|
[15] Y.W. Huang, C.T. Tsai, T.P Lin, S.K. Huang, D.T. Lee, and S.Y. Kuo. A testing framework for Web application security assessment. In Journal: Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security, Volume 48 Issue 5, 2005, pp 739-761 |
Sách, tạp chí |
Tiêu đề: |
Journal: Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security |
|
[16] V. Livshits and M. Lam. Finding security vulnerabilities in Java applications with static analysis. In Proceedings of the 14th USENIX Security Symposium, 2005, pp. 271-286 |
Sách, tạp chí |
Tiêu đề: |
Proceedings of the 14th USENIX Security Symposium |
|
[17] Y.W. Huang, F. Yu, C. Hang, C.H. Tsai, D. Lee, and S.Y. Kuo. Securing Web application code by static analysis and runtime protection. In Proceedings of the 13th ACM International World Wide Web Conference, 2004, pp. 40-52 |
Sách, tạp chí |
Tiêu đề: |
Proceedings of the 13th ACM International World Wide Web Conference |
|
[18] Y.W. Huang, F. Yu, C. Hang, C.H. Tsai, D.T. Lee, and S.Y. Kuo. Verifying Web applications using bounded model checking. In Proceedings of the 2004 International Conference Dependable Systems and Networks (DSN2004), Italy, 2004 |
Sách, tạp chí |
Tiêu đề: |
Proceedings of the 2004 International Conference Dependable Systems and Networks (DSN2004) |
|
[19] D. Scott, and R. Sharp. Abstracting application-level Web security. In The 11th International Conference on the World Wide Web, Hawaii, 2002, pp. 396-407 |
Sách, tạp chí |
Tiêu đề: |
The 11th International Conference on the World Wide Web |
|
[20] L. Auronen. Tool-based approach to assessing Web application security. Seminar on Network Security, 2002 |
Sách, tạp chí |
Tiêu đề: |
Network Security |
|
[21] D. Scott, and R. Sharp. Developing secure Web applications. In IEEE Internet Computing 6, 2002, pp 38-45 |
Sách, tạp chí |
Tiêu đề: |
IEEE Internet Computing 6 |
|
[4] Open Web Application Security Project. OWASP Application Security Verification Standard 2009 – Web application standard.http://www.owasp.org/index.php/ASVS |
Link |
|
[5] Open Web Application Security Project. What is a Web application?. http://www.owasp.org/tutorials/webapps.shtml |
Link |
|
[22] D. Ragle. Introduction to Perl's taint mode. http://www.webreference.com/programming/perl/taint [23] ParosProxy http://www.parosproxy.org/index.shtml |
Link |
|
[26] The Web Application Security Consortium WASC. Web application security statistics, http://projects.webappsec.org/w/page/13246989/Web-Application-Security-Statistics |
Link |
|
[6] Ethical Hacking and Countermeasures Version 6. Web application vulnerabilities. CEHv6 Module 17 |
Khác |
|
[9] M. Cova, V. Felmetsger, and G. Vigna. Testing and analysis of Web services. Springer 2007 |
Khác |
|