Author:
Scholte Theodoor,Balzarotti Davide,Kirda Engin
Publisher
Springer Berlin Heidelberg
Reference36 articles.
1. Bates, D., Barth, A., Jackson, C.: Regular expressions considered harmful in client-side xss filters. In: WWW 2010: Proceedings of the 19th International Conference on World Wide Web, pp. 91–100. ACM, New York (2010)
2. Christey, S.M., Martin, R.A.: Vulnerability type distributions in cve (2007), http://cwe.mitre.org/documents/vuln-trends/index.html
3. Clark, S., Frei, S., Blaze, M., Smith, J.: Familiarity breeds contempt: The honeymoon effect and the role of legacy code in zero-day vulnerabilities. In: Annual Computer Security Applications Conference (2010)
4. Dhamankar, R., Dausin, M., Eisenbarth, M., King, J.: The top cyber security risks (2009), http://www.sans.org/top-cyber-security-risks/
5. Frei, S., May, M., Fiedler, U., Plattner, B.: Large-scale vulnerability analysis. In: LSAD 2006: Proceedings of the 2006 SIGCOMM Workshop on Large-Scale Attack Defense, pp. 131–138. ACM, New York (2006)
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Empirical Validation of Automated Vulnerability Curation and Characterization;IEEE Transactions on Software Engineering;2023-05-01
2. DECO: Liberating Web Data Using Decentralized Oracles for TLS;Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security;2020-10-30
3. Invetter;Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security;2018-01-15
4. WebMTD;Proceedings of the 2017 Workshop on Moving Target Defense;2017-10-30
5. TestREx: a framework for repeatable exploits;International Journal on Software Tools for Technology Transfer;2017-09-25