共 50 条
- [21] A Grey-Box Approach for Detecting Malicious User Interactions in Web Applications MIST'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS, 2016, : 1 - 12
- [23] A Practical Analysis of TLS Vulnerabilities in Korea Web Environment INFORMATION SECURITY APPLICATIONS, WISA 2016, 2017, 10144 : 112 - 123
- [24] Access Control Vulnerabilities Detection for Web Application Components 2020 IEEE 6TH INT CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / 6TH IEEE INT CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) / 5TH IEEE INT CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2020, : 24 - 28
- [25] AChecker: Statically Detecting Smart Contract Access Control Vulnerabilities 2023 IEEE/ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ICSE, 2023, : 945 - 956
- [26] Access Control Architecture Separating Privilege by a Thread on a Web Server 2012 IEEE/IPSJ 12TH INTERNATIONAL SYMPOSIUM ON APPLICATIONS AND THE INTERNET (SAINT), 2012, : 178 - 183
- [28] UChecker: Automatically Detecting PHP-Based Unrestricted File Upload Vulnerabilities 2019 49TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2019), 2019, : 581 - 592
- [30] Research and implementation of Detecting Cross-Site Scripting Vulnerabilities Based on Crawler PROCEEDINGS OF 2010 ASIA-PACIFIC YOUTH CONFERENCE ON COMMUNICATION, VOLS 1 AND 2, 2010, : 292 - +