Precise Detection of Injection Attacks on Concrete Systems

作者: Clayton Whitelaw

DOI:

关键词:

摘要:

参考文章(28)
Timothy Vidas, Nicolas Christin, Daniel Votipka, All your droid are belong to us: a survey of current android attacks WOOT'11 Proceedings of the 5th USENIX conference on Offensive technologies. pp. 10- 10 ,(2011)
Donald Ray, Jay Ligatti, Defining Injection Attacks international conference on information security. pp. 425- 441 ,(2014) , 10.1007/978-3-319-13257-0_26
Clemens Orthacker, Peter Teufl, Stefan Kraxberger, Günther Lackner, Michael Gissing, Alexander Marsalek, Johannes Leibetseder, Oliver Prevenhueber, Android Security Permissions – Can We Trust Them? security and privacy in mobile information and communication systems. pp. 40- 51 ,(2011) , 10.1007/978-3-642-30244-2_4
Anh Nguyen-Tuong, Salvatore Guarnieri, Doug Greene, Jeff Shirley, David Evans, Automatically Hardening Web Applications Using Precise Tainting information security conference. pp. 295- 307 ,(2004) , 10.1007/0-387-25660-1_20
Sandeep Bhatkar, R. Sekar, Wei Xu, Taint-enhanced policy enforcement: a practical approach to defeat a wide range of attacks usenix security symposium. pp. 9- ,(2006)
Tadeusz Pietraszek, Chris Vanden Berghe, Defending Against Injection Attacks Through Context-Sensitive String Evaluation Lecture Notes in Computer Science. pp. 124- 145 ,(2006) , 10.1007/11663812_7
Gregor Kiczales, Erik Hilsdale, Jim Hugunin, Mik Kersten, Jeffrey Palm, William G. Griswold, An Overview of AspectJ ECOOP 2001 — Object-Oriented Programming. pp. 327- 354 ,(2001) , 10.1007/3-540-45337-7_18
Francesco Di Cerbo, Andrea Girardello, Florian Michahelles, Svetlana Voronkova, Detection of malicious applications on Android OS international workshop on computational forensics. pp. 138- 149 ,(2010) , 10.1007/978-3-642-19376-7_12
Jonas Magazinius, Billy K. Rios, Andrei Sabelfeld, Polyglots: crossing origins by crossing formats computer and communications security. pp. 753- 764 ,(2013) , 10.1145/2508859.2516685