共 20 条
[1]
Acunetix, AC WEB CRAWL
[2]
[Anonymous], 2009, P 5 WORKSH HOTDEP
[3]
Artzi Shay., 2008, P 2008 INT S SOFTWAR, P261, DOI DOI 10.1145/1390630.1390662
[4]
Barrett C., 2005, COMPUTER AIDED VERIF, P503
[5]
BELLARD F, 2005, QEMU FAST PORTABLE D
[6]
Bisht P, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P575
[7]
Cadar C., 2008, Proceedings of the 8th USENIX conference on Operating systems design and implementation, OSDI'08, (USA), P209
[8]
Symbolic Security Analysis of Ruby-on-Rails Web Applications
[J].
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10),
2010,
:585-594
[9]
DeMott J. D., 2011, 2011 6th International Conference for Internet Technology and Secured Transactions (ICITST), P323
[10]
Forcier J., 2008, PYTHON WEB DEV DJANG