|
[1] S.-K. Huang, H.-L. Lu, W.-M. Leong, and H. Liu, "Craxweb: Automatic web application testing and attack generation," in Software Security and Reliability (SERE), 2013 IEEE 7th International Conference on, 2013, pp. 208-217: IEEE. [2] P. Bisht, T. Hinrichs, N. Skrupsky, and V. Venkatakrishnan, "WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction," in Proceedings of the 18th ACM conference on Computer and communications security, 2011, pp. 575-586: ACM. [3] M. Martin and M. S. Lam, "Automatic generation of XSS and SQL injection attacks with goal-directed model checking," in Proceedings of the 17th conference on Security symposium, 2008, pp. 31-43: USENIX Association. [4] T. Avgerinos, S. K. Cha, A. Rebert, E. J. Schwartz, M. Woo, and D. Brumley, "Automatic exploit generation," Communications of the ACM, vol. 57, no. 2, pp. 74-84, 2014. [5] J. C. King, "Symbolic execution and program testing," Communications of the ACM, vol. 19, no. 7, pp. 385-394, 1976. [6] E. J. Schwartz, T. Avgerinos, and D. Brumley, "All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)," in Security and privacy (SP), 2010 IEEE symposium on, 2010, pp. 317-331: IEEE. [7] W. G. Halfond, J. Viegas, and A. Orso, "A classification of SQL-injection attacks and countermeasures," in Proceedings of the IEEE International Symposium on Secure Software Engineering, 2006, vol. 1, pp. 13-15: IEEE. [8] S. Artzi et al., "Finding bugs in dynamic web applications," in Proceedings of the 2008 international symposium on Software testing and analysis, 2008, pp. 261-272: ACM. [9] K. Sen, S. Kalasapur, T. Brutch, and S. Gibbs, "Jalangi: A selective record-replay and dynamic analysis framework for JavaScript," in Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, 2013, pp. 488-498: ACM. [10] G. Li, E. Andreasen, and I. Ghosh, "SymJS: automatic symbolic testing of JavaScript web applications," in Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2014, pp. 449-459: ACM. [11] J. P. Near and D. Jackson, "Derailer: interactive security analysis for web applications," in Proceedings of the 29th ACM/IEEE international conference on Automated software engineering, 2014, pp. 587-598: ACM. [12] S. Bucur, J. Kinder, and G. Candea, "Prototyping symbolic execution engines for interpreted languages," ACM SIGARCH Computer Architecture News, vol. 42, no. 1, pp. 239-254, 2014. [13] V. Chipounov, V. Kuznetsov, and G. Candea, "S2E: A platform for in-vivo multi-path analysis of software systems," ACM SIGPLAN Notices, vol. 46, no. 3, pp. 265-278, 2011. [14] K. Sen, G. Necula, L. Gong, and W. Choi, "MultiSE: Multi-path symbolic execution using value summaries," in Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015, pp. 842-853: ACM. [15] N. Jovanovic, C. Kruegel, and E. Kirda, "Pixy: A static analysis tool for detecting web application vulnerabilities," in Security and Privacy, 2006 IEEE Symposium on, 2006, pp. 6 pp.-263: IEEE. [16] P. Bisht and V. Venkatakrishnan, "XSS-GUARD: precise dynamic prevention of cross-site scripting attacks," in International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, 2008, pp. 23-43: Springer. [17] N. Li, T. Xie, M. Jin, and C. Liu, "Perturbation-based user-input-validation testing of web applications," Journal of Systems and Software, vol. 83, no. 11, pp. 2263-2274, 2010. [18] A. B. M. Ali, M. S. Abdullah, and J. Alostad, "SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks," Procedia Computer Science, vol. 3, pp. 453-458, 2011. [19] W. Tian, J.-F. Yang, J. Xu, and G.-N. Si, "Attack model based penetration test for SQL injection vulnerability," in Computer Software and Applications Conference Workshops (COMPSACW), 2012 IEEE 36th Annual, 2012, pp. 589-594: IEEE. [20] Y. Zheng and X. Zhang, "Path sensitive static analysis of web applications for remote code execution vulnerability detection," in Proceedings of the 2013 International Conference on Software Engineering, 2013, pp. 652-661: IEEE Press. [21] M. K. Gupta, M. C. Govil, G. Singh, and P. Sharma, "XSSDM: Towards detection and mitigation of cross-site scripting vulnerabilities in web applications," in Advances in Computing, Communications and Informatics (ICACCI), 2015 International Conference on, 2015, pp. 2010-2015: IEEE. [22] A. Naderi-Afooshteh, A. Nguyen-Tuong, M. Bagheri-Marzijarani, J. D. Hiser, and J. W. Davidson, "Joza: Hybrid Taint Inference for Defeating Web Application SQL Injection Attacks," in Dependable Systems and Networks (DSN), 2015 45th Annual IEEE/IFIP International Conference on, 2015, pp. 172-183: IEEE. [23] R. Sekar, "An Efficient Black-box Technique for Defeating Web Application Attacks," in NDSS, 2009. [24] A. Nguyen-Tuong et al., "To B or not to B: Blessing OS commands with software DNA shotgun sequencing," in Dependable Computing Conference (EDCC), 2014 Tenth European, 2014, pp. 238-249: IEEE. [25] I. Medeiros, N. Neves, and M. Correia, "DEKANT: a static analysis tool that learns to detect web application vulnerabilities," in Proceedings of the 25th International Symposium on Software Testing and Analysis, 2016, pp. 1-11: ACM. [26] X. Fu and K. Qian, "SAFELI: SQL injection scanner using symbolic execution," in Proceedings of the 2008 workshop on Testing, analysis, and verification of web services and applications, 2008, pp. 34-39: ACM. [27] A. Kieyzun, P. J. Guo, K. Jayaraman, and M. D. Ernst, "Automatic creation of SQL injection and cross-site scripting attacks," in Software Engineering, 2009. ICSE 2009. IEEE 31st International Conference on, 2009, pp. 199-209: IEEE. [28] P. Saxena, D. Akhawe, S. Hanna, F. Mao, S. McCamant, and D. Song, "A symbolic execution framework for javascript," in Security and Privacy (SP), 2010 IEEE Symposium on, 2010, pp. 513-528: IEEE. [29] A. Chaudhuri and J. S. Foster, "Symbolic security analysis of ruby-on-rails web applications," in Proceedings of the 17th ACM conference on Computer and communications security, 2010, pp. 585-594: ACM. [30] Y.-Y. Huang, K. Chen, and S.-L. Chiang, "Finding Security Vulnerabilities in Java Web Applications with Test Generation and Dynamic Taint Analysis," in Proceedings of the 2011 2nd International Congress on Computer Applications and Computational Science, 2012, pp. 133-138: Springer. [31] G. Agosta, A. Barenghi, A. Parata, and G. Pelosi, "Automated security analysis of dynamic web applications through symbolic code execution," in Information Technology: New Generations (ITNG), 2012 Ninth International Conference on, 2012, pp. 189-194: IEEE. |