1. Mohamed Almorsy , John Grundy , and Amani S. Ibrahim . 2012. Supporting automated vulnerability analysis using formalized vulnerability signatures . In 2012 Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering. 100--109 . https://doi.org/10.1145/2351676.2351691 10.1145/2351676.2351691 Mohamed Almorsy, John Grundy, and Amani S. Ibrahim. 2012. Supporting automated vulnerability analysis using formalized vulnerability signatures. In 2012 Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering. 100--109. https://doi.org/10.1145/2351676.2351691
2. Andrea Avancini and Mariano Ceccato . 2010. Towards Security Testing with Taint Analysis and Genetic Algorithms (SESS '10) . Association for Computing Machinery , New York, NY, USA , 65--71. https://doi.org/10.1145/ 1809 100.1809110 10.1145/1809100.1809110 Andrea Avancini and Mariano Ceccato. 2010. Towards Security Testing with Taint Analysis and Genetic Algorithms (SESS '10). Association for Computing Machinery, New York, NY, USA, 65--71. https://doi.org/10.1145/1809100.1809110
3. Michael Backes , Konrad Rieck , Malte Skoruppa , Ben Stock , and Fabian Yamaguchi . 2017 . Efficient and Flexible Discovery of PHP Application Vulnerabilities. In 2017 IEEE European Symposium on Security and Privacy (EuroS&P). 334--349 . https://doi.org/10.1109/EuroSP.2017.14 10.1109/EuroSP.2017.14 Michael Backes, Konrad Rieck, Malte Skoruppa, Ben Stock, and Fabian Yamaguchi. 2017. Efficient and Flexible Discovery of PHP Application Vulnerabilities. In 2017 IEEE European Symposium on Security and Privacy (EuroS&P). 334--349. https://doi.org/10.1109/EuroSP.2017.14
4. Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications
5. Why Don’t Developers Detect Improper Input Validation? '; DROP TABLE Papers; --