Author:
Avancini Andrea,Ceccato Mariano
Subject
Computer Science Applications,Information Systems,Software
Reference32 articles.
1. S. Christey, R.A. Martin, Vulnerability type distributions in cve, Tech. rep., The MITRE Corporation, 2006 .
2. N. Jovanovic, C. Kruegel, E. Kirda, Pixy: A static analysis tool for detecting web application vulnerabilities (short paper), in: SP ’06: Proceedings of the 2006 IEEE Symposium on Security and Privacy, IEEE Computer Society, Washington, DC, USA, 2006, pp. 258–263 doi:http://dx.doi.org/10.1109/SP.2006.29.
3. C. Leonardi, L. Sabatucci, A. Susi, M. Zancanaro, Ahab’s leg: Exploring the issues of communicating semi-formal requirements to the final users, in: CAiSE, 2010, pp. 455–469.
4. G. Wassermann, Z. Su, Static detection of cross-site scripting vulnerabilities, in: ICSE ’08: Proceedings of the 30th International Conference on Software Engineering, ACM, New York, NY, USA, 2008, pp. 171–180, doi:http://doi.acm.org/10.1145/1368088.1368112.
5. M. Sharir, A. Pnueli, Program Flow Analysis: Theory and Applications, Prentice Hall, 1981 (Ch. Two approaches to interprocedural data flow analysis, pp. 189–233).
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献