共 50 条
- [41] Finding SQL Injection and Cross Site Scripting Vulnerabilities with Diverse Static Analysis Tools 2018 14TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2018), 2018, : 57 - 64
- [42] Mining SQL Injection and Cross Site Scripting Vulnerabilities using Hybrid Program Analysis PROCEEDINGS OF THE 35TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2013), 2013, : 642 - 651
- [43] Mining Input Sanitization Patterns for Predicting SQL Injection and Cross Site Scripting Vulnerabilities 2012 34TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2012, : 1293 - 1296
- [44] FaultHunter: Automatically Detecting Vulnerabilities in C against Fault Injection Attacks 2022 IEEE/ACM INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING, APPLICATIONS AND TECHNOLOGIES, BDCAT, 2022, : 271 - 276
- [45] Characterizing, Exploiting, and Detecting DMA Code Injection Vulnerabilities in the Presence of an IOMMU PROCEEDINGS OF THE SIXTEENTH EUROPEAN CONFERENCE ON COMPUTER SYSTEMS (EUROSYS '21), 2021, : 395 - 409
- [47] An automated and scalable formal process for detecting fault injection vulnerabilities in binaries CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (23):
- [48] Detecting SQL Injection Attacks in Cloud SaaS using Machine Learning 2020 IEEE 6TH INT CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / 6TH IEEE INT CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) / 5TH IEEE INT CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2020, : 145 - 150
- [49] Static Analysis Method for Detecting Buffer Overflow Vulnerabilities Programming and Computer Software, 2005, 31 : 179 - 189