Tuesday 29 May 2012


References2



Costa, M., Crowcroft, J., Castro, M., Rowstron, A., Zhou, L., Zhang, L., Barham, P.: Vigilante:
End-to-End Containment of Internet Worms. In: Proceedings of the Symposium on
Systems and Operating Systems Principles, pp. 133–147 (2005)

Crandall, J.R., Su, Z., Wu, S.F., Chong, F.T.: On deriving unknown vulnerabilities from
zero-day polymorphic and metamorphic worm exploits. In: Proceedings of the 12th ACM
conference on Computer and communications security, pp. 235–248. ACM Press, New
York (2005)

Edwards, D.: Dean Edwards Javascript packer,
http://dean.edwards.name/packer/

Firebug, http://getfirebug.com/

 Gundy, M.V., Chen, H.: Noncespaces: using randomization to enforce information flow
tracking and thwart cross-site scripting attacks. In: Proceedings of the 16th Annual Network
and Distributed System Security Symposium (2009)

Hansen, R.: XSS cheat sheet, http://ha.ckers.org/xss.html

Jim, T., Swamy, N., Hicks, M.: Defeating script injection attacks with Browser-Enforced
Embedded Policies. In: WWW, pp. 601–610 (2007)

 Kamkar, S.: The Samy worm (2005), http://namb.la/popular/tech.html

Kirda, E., Kruegel, C., Vigna, G., Jovanovic, N.: Noxes: A client-side solution for mitigating
cross-site scripting attacks. In: SAC, pp. 330–337 (2006)

[15] Li, Z., Sanghi, M., Chen, Y., Kao, M.-y., Chavez, B.: Hamsa: fast signature generation for
zero-day polymorphic worms with provable attack resilience. In: Proceedings of the 2006
IEEE Symposium on Security and Privacy, pp. 32–47. IEEE Computer Society Press, Los
Alamitos (2006)

 Liang, Z., Sekar, R.: Fast and automated generation of attack signatures: A basis for building
self-protecting servers. In: Proceedings of the 12th ACM conference on Computer and
communications security (2005)
 Livshits, B., Cui, W.: Spectator: detection and containment of JavaScript worms. In:
USENIX 2008 Annual Technical Conference on Annual Technical Conference, pp. 335–
348. USENIX Association (2008)

 Diminutive XSS worm replication contest (2008)
http://sla.ckers.org/forum/read.php?2,18790,page=19

 Ahmed, T.: The trigram algorithm,
http://search.cpan.org/dist/String-Trigram/Trigram.pm

 Alexa. Top sites in United States, http://www.alexa.com/topsites

 Balzarotti, D., Cova, M., Felmetsger, V., Jovanovic, N., Kirda, E., Kruegel, C., Vigna, G.:
Saner: Composing static and dynamic analysis to validate sanitization inWeb applications.
In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 387–401. IEEE Computer
Society Press, Los Alamitos (2008)

Chang, W., Streiff, B., Lin, C.: Efficient and extensible security enforcement using dynamic
data flow analysis. In: Proceedings of the 15th ACM conference on Computer and
communications security, pp. 39–50. ACM Press, New York (2008)


Louw, M.T., Venkatakrishnan, V.N.: Blueprint: Robust prevention of cross-site scripting
attacks for existing browsers. In: Proceedings of the 30th IEEE Symposium on Security
and Privacy (2009)
554 F. Sun, L. Xu, and Z. Su

Mozilla Corporation. Same origin policy for JavaScript, https://developer.
mozilla.org/En/Same origin policy for JavaScript

Nadji, Y., Saxena, P., Song, D.: Document structure integrity: A robust basis for cross-site
scripting defense. In: Proceedings of the 16th Annual Network and Distributed System
Security Symposium (2009)

Newsome, J., Song, D.: Dynamic taint analysis for automatic detection, analysis, and signature
generation of exploits on commodity software. In: Proceedings of the 12th Annual
Network and Distributed System Security Symposium (2005)

 OWASP, http://www.owasp.org

 Sekar, R.: An efficient black-box technique for defeating Web application attacks. In: Proceedings
of the 16th Annual Network and Distributed System Security Symposium (2009)

 Su, Z.,Wassermann, G.: The essence of command injection attacks in web applications. In:
Proceedings of the 33rd Annual Symposium on Principles of Programming Languages, pp.
372–382. ACM Press, New York (2006)

 Symantec Corporation. Symantec Global Internet Security Threat Report, vol. XIII (2008)

 W3C, http://www.w3.org/

Wang, K., Cretu, G., Stolfo, S.J.: Anomalous payload-based worm detection and signature
generation. In: Proceedings of the 8th International Symposium on Recent Advances in
Intrusion Detection, pp. 227–246 (2005)

Wang, K., Parekh, J.J., Stolfo, S.J.: Anagram: A content anomaly detector resistant to
mimicry attack. In: Proceedings of the 9th International Symposium on Recent Advances
in Intrusion Detection, pp. 226–248 (2006)

 Wassermann, G., Su, Z.: Static detection of cross-site scripting vulnerabilities. In: Proceedings
of the 30th International Conference on Software Engineering, pp. 171–180. ACM
Press, New York (2008)

 Xie, Y., Aiken, A.: Static detection of security vulnerabilities in scripting languages. In:
Proceedings of the 15th conference on USENIX Security Symposium, USENIX Association
(2006)

No comments:

Post a Comment