Tuesday 29 May 2012


REFERENCES1

 S. M. Metev, and V. P. Veiko, “Laser Assisted Microtechnology,” 2nd
ed., R. M. Osgood, Jr., Ed. Berlin, Germany: Springer-Verlag, 1998.
 Z. Su and G. Wassermann, “The essence of command Injection Attacks
in Web Applications,” In Proceeding of the 33rd Annual Symposium on
Principles of Programming Languages, USA: ACM, January 2006, pp.
372-382.

 C. Yue and H. Wang, “Charactering Insecure JavaScript Practice on the
Web,” In Proceedings of the 18th International Conference on the World
Wide Web, Madrid, Spain: ACM, April 20-24, 2005.

Y. Xie, and A. Aiken, “Static detection of security vulnerabilities in
scripting languages,” In Proceeding of the 15th USENIX Security
Symposium, July 2006, pp. 179-192.
[5] Y. Minamide, “Static Approximation of Dynamically Generated Web
Pages,” In Proceedings of the 14th International Conference on the World
Wide Web, 2005, pp. 432-441.
 Y.-W. Huang, F. Yu, C. Hang, C. H. Tsai, D. Lee, and S.Y. Kuo,
“Securing web application code by static analysis and runtime
protection,” In Proceedings of the 13th International World Wide Web
Conference, 2004.
 A.S. Christensen, A. Mǿller, and M.I. Schwartzbach, “Precise analysis
of string expression,” In proceedings of the 10th international static
analysis symposium, vol. 2694 of LNCS, Springer-Verlag, pp. 1-18.
Wikipedia, http://wikipedia.org.

 V.B. Livshits, and M.S. Lam, “Finding security errors in Java programs
with static analysis,” In proceedings of the 14th Usenix security
symposium, August 2005, pp. 271-286.

 T. Jim, N. Swamy, and M. Hicks, “BEEP: Browser-Enforced Embedded
Policies,” In Proceedings of the 16th International World Wide Web
Conference, ACM, 2007, pp. 601-610.
 P. Bisht, and V.N. Venkatakrishnan, “XSS-GUARD: Precise dynamic
prevention of Cross-Site Scripting Attacks,” In Proceeding of 5th
Conference on Detection of Intrusions and Malware & Vulnerability
Assessment, LNCS 5137, 2008, pp. 23-43.
 N. Jovanovic, C. Kruegel, and E. Kirda, “Pixy: A static analysis tool for
detecting web application vulnerabilities (short paper),” In 2006 IEEE
Symposium on Security and Privacy, Oakland, CA: May 2006.

 E. Kirda, C. Kruegel, G. Vigna, and N. Jovanovic, “Noxes: A client-side
solution for mitigating cross site scripting attacks,” In Proceedings of the
21st ACM symposium on Applied computing, ACM, 2006, pp. 330-337.

 Grossman, RSNAKE, PDP, Rager, and Fogie, “XSS Attacks: Cross-site
Scripting Exploits and Defense,” Syngress Publishing Inc, 2007.
 Y.-W. Huang, S.-K. Huang, T.-P. Lin, and C.-H. Tsai, “Web application
security assessment by fault injection and Behavior Monitoring,” In
Proceeding of the 12th international conference on World Wide Web,
ACM, New York, NY, USA: 2003, pp.148-159.
[16] A. Klein, “DOM Based Cross Site Scripting or XSS of the Third Kind,”
http://www.webappsec.org/projects/articles/071105.html, July 2005.
 “OWASP Document for top 10 2007- cross Site Scripting,”
http://www.owasp.org/index.php/Top_10_2007-Cross_Site_Scripting.
T. Pietraszek, and C. V. Berghe, “Defending against Injection Attacks
through Context-Sensitive String Evaluation,” In Proceeding of the 8th
International Symposium on Recent Advance in Intrusion Detection
(RAID), September 2005.
 D. Balzarotti, M. Cova, V. Felmetsger, N.Jovanovic, E. Kirda, C.
Kruegel, and G. Vigna, “Saner: Composing Static and Dynamic
Analysis to Validate Sanitization in Web Applications,” In IEEE
symposium on Security and Privacy, 2008.
“Web Application Security Assessment,” SPI Dynamics Whitepaper,
SPI Dynamics, 2003.
“Web Application Security Testing – AppScan 3.5,” Sanctum Inc.,
http://www.sanctuminc.com.
 “JavaScript Security: Same origin,” Mozilla Foundation,
http://www.mozilla.org/projects/security/components/same-origin.html,
February 2006.
 “InterDo Version 3.0,” Kavado Whitepaper, Kavado Inc. , 2003.
 “AppShield,” Sanctum Inc. http://sanctuminc.com, 2005.
 D. Balzarotti, M. Cova, V. V. Felmetsger, and G. Vigna, “Multi-Module
Vulnerability Analysis of Web-based Applications,” In proceeding of
14th ACM Conference on Computer and Communications Security,
Alexandria, Virginia, USA: October 2007.
N. Jovanovic, C. Kruegel, and E. Kirda, “Precise alias analysis for
syntactic detection of web application vulnerabilities,” In ACM
SIGPLAN Workshop on Programming Languages and Analysis for
security, Ottowa, Canada: June 2006.
 D. Scott, and R. Sharp, “Abstracting Application-Level Web Security,”
In Proceeding 11th international World Wide Web Conference,
Honolulu, Hawaii: 2002, pp. 396-407.
[28] Y.-W Huang, F. Yu, C. Hang, C. –H. Tsai, D. Lee, and S. –Y. Kuo.
“Verifying Web Application using BoundedModel Checking,” In
Proceedings of the International Conference on Dependable Systems and
Networks, 2004.
 G. Wassermann, and Z. Su, “Static detection of cross-site Scripting
vulnerabilities,” In Proceeding of the 30th International Conference on
Software Engineering, May 2008.
S. Christey, “Vulnerability type distributions in CVE,”
http://cwe.mitre.org/documents/vuln-trends.html, October 2006.
H. Hosoya, B. C. Pierce, “Xduce: A typed xml processing language
(preliminary report),” In Proceeding of the 3rd International Workshop
on World Wide Web and Databases, Springer-Verlag, London, UK:
2001, pp. 226—244.
 M. Mohri, M. Nederhof, “Regular approximation of context-free
grammars through transformation,” Robustness in Language and Speech
Technology, 1996, pp. 231-238
 “LogiCampus Educational Platform,”
http://sourceforge.net/projects/logicampus
 “Testing for DOM-based cross-site scripting (OWASP-DV-003),”
http://www.owasp.org/index.php/Testing_for_DOMbased_
Cross_site_scripting_(OWASP-DV-003)

No comments:

Post a Comment