共 16 条
[1]
[Anonymous], 2014, THOUGHT LEADERSHIP W
[2]
[Anonymous], 2017, Technical Report
[3]
Efficient and Flexible Discovery of PHP Application Vulnerabilities
[J].
2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P),
2017,
:334-349
[4]
Dahse Johannes, 2014, S NETW DISTR SYST SE, P23
[5]
Gupta Mukesh Kumar, 2014, International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014), P1
[6]
Hauzar D., 2015, LEIBNIZ INT P INFORM, V37, P689, DOI [10.4230/LIPIcs.ECOOP.2015.689, DOI 10.4230/LIPICS.ECOOP.2015.689]
[7]
Pixy: A static analysis tool for detecting Web application vulnerabilities - (Short paper)
[J].
2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2006,
:258-+
[8]
Automatic Creation of SQL Injection and Cross-Site Scripting Attacks
[J].
2009 31ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, PROCEEDINGS,
2009,
:199-+
[9]
Automatic Detection and Correction of Web Application Vulnerabilities using Data Mining to Predict False Positives
[J].
WWW'14: PROCEEDINGS OF THE 23RD INTERNATIONAL CONFERENCE ON WORLD WIDE WEB,
2014,
:63-73
[10]
An Approach to Merge Results of Multiple Static Analysis Tools
[J].
QSIC 2008: PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE,
2008,
:169-+