共 50 条
- [41] A Formal Approach to Exploiting Multi-stage Attacks Based on File-System Vulnerabilities of Web Applications ENGINEERING SECURE SOFTWARE AND SYSTEMS, ESSOS 2017, 2017, 10379 : 196 - 212
- [42] Finding SQL Injection and Cross Site Scripting Vulnerabilities with Diverse Static Analysis Tools 2018 14TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2018), 2018, : 57 - 64
- [43] Mining SQL Injection and Cross Site Scripting Vulnerabilities using Hybrid Program Analysis PROCEEDINGS OF THE 35TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2013), 2013, : 642 - 651
- [44] Formal framework for automated analysis and verification of web-based applications 19TH INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, PROCEEDINGS, 2004, : 410 - 413
- [45] On race vulnerabilities in web applications DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, 2008, 5137 : 126 - 142
- [46] Vulnerabilities of Modern Web Applications 2017 40TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2017, : 1256 - 1261
- [47] Semi-Automated Verification of Defense against SQL Injection in Web Applications 2012 19TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC), VOL 1, 2012, : 91 - 96
- [48] Security Slicing for Auditing XML, XPath, and SQL Injection Vulnerabilities 2015 IEEE 26TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2015, : 553 - 564
- [50] An Empirical Analysis of Vulnerabilities in Python']Python Packages for Web Applications 2018 9TH INTERNATIONAL WORKSHOP ON EMPIRICAL SOFTWARE ENGINEERING IN PRACTICE (IWESEP), 2018, : 25 - 30