Sciweavers

140 search results - page 5 / 28
» TAJ: effective taint analysis of web applications
Sort
View
PLDI
2006
ACM
14 years 19 days ago
Precise alias analysis for static detection of web application vulnerabilities
The number and the importance of web applications have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such applica...
Nenad Jovanovic, Christopher Kruegel, Engin Kirda
MICRO
2006
IEEE
124views Hardware» more  MICRO 2006»
14 years 21 days ago
LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks
Computer security is severely threatened by software vulnerabilities. Prior work shows that information flow tracking (also referred to as taint analysis) is a promising techniqu...
Feng Qin, Cheng Wang, Zhenmin Li, Ho-Seop Kim, Yua...
EUROSYS
2008
ACM
14 years 3 months ago
Application-level isolation and recovery with solitude
When computer systems are compromised by an attack, it is difficult to determine the precise extent of the damage caused by the attack because the state changes made by an attack...
Shvetank Jain, Fareha Shafique, Vladan Djeric, Ash...
AC
2006
Springer
13 years 6 months ago
Web Testing for Reliability Improvement
In this chapter, we characterize problems for web applications, examine existing testing techniques that are potentially applicable to the web environment, and introduce a strateg...
Jeff Tian, Li Ma
IADIS
2004
13 years 8 months ago
Separating Features for Assuring Quality Attributes of Client Web Applications
Developing Web applications is usually accomplished in ad hoc manner. Such manner generally results in very poor quality products, with "spaghetti-like" structures makin...
Mohamed Sharaf Aun, I. M. Atiqul, Shoji Yuen, Kiyo...