• Pixy

  • Referenced in 5 articles [sw25249]
  • static analysis tool for detecting web application vulnerabilities. The number and the importance ... Web applications have increased rapidly over the last years. At the same time, the quantity ... paper, we address the problem of vulnerable Web applications by means of static source code ... reported 15 previously unknown vulnerabilities in three Web applications, and reconstructed 36 known vulnerabilities...
  • S3

  • Referenced in 9 articles [sw19495]
  • symbolic string solver for vulnerability detection in web applications. Motivated by the vulnerability analysis ... language that is expressive enough for widespread applicability. Specifically, our language covers all the main...
  • Saner

  • Referenced in 9 articles [sw37817]
  • handle sensitive user data. Unfortunately, web applications are often implemented by developers with limited security ... these vulnerabilities stem from the lack of input validation. That is, web applications use malicious ... vulnerability analysis has mostly focused on identifying cases in which a web application directly uses ... web application applies some sanitization routine to potentially malicious input, the vulnerability analysis assumes that...
  • TAJ

  • Referenced in 7 articles [sw33114]
  • effective taint analysis of web applications. Taint analysis, a form of information-flow analysis, establishes ... analysis can detect many common vulnerabilities in Web applications, and so has attracted much attention...
  • CryptDB

  • Referenced in 16 articles [sw27061]
  • Online applications are vulnerable to theft of sensitive information because adversaries can exploit software bugs ... face of these attacks for applications backed by SQL databases. It works by executing ... reducing throughput by 14.5% for phpBB, a web forum application, and by 26% for queries...
  • Merlin

  • Referenced in 5 articles [sw23076]
  • flow vulnerabilities commonly found in Web applications now outnumber vulnerabilities such as buffer overruns common ... Tools checking for these vulnerabilities require a specification to operate. In most cases the task ... easy to miss, leading to missed vulnerabilities; similarly, incorrect specifications may lead to false positives ... large business-critical Web applications that have been analyzed with CAT.NET, a state...
  • WAPTEC

  • Referenced in 5 articles [sw21854]
  • tampering attacks are dangerous to a web application whose server fails to replicate the validation ... designed to automatically identify parameter tampering vulnerabilities and generate exploits by construction to demonstrate those...
  • SAFEWAPI

  • Referenced in 1 article [sw38000]
  • complicated for JavaScript web applications which may lead to severe security vulnerabilities. To help developers...
  • SessionShield

  • Referenced in 2 articles [sw38008]
  • vulnerabilities is the most prevalent security problem in the field of Web applications ... client-side attack, the actual vulnerability resides on the server-side and, thus...
  • TryLinks

  • Referenced in 1 article [sw28846]
  • Edinburgh aimed at simplifying web development. Conventional multi-tier applications involve programming in several languages ... security vulnerabilities. In Links, programs combine all of the code of a web application...
  • Cujo

  • Referenced in 1 article [sw37812]
  • Besides its great success in enhancing web applications, however, JavaScript provides the basis ... called drive-by downloads---attacks exploiting vulnerabilities in web browsers and their extensions for unnoticeably...
  • Lift

  • Referenced in 1 article [sw36775]
  • other web frameworks. Lift applications are: Secure -- Lift apps are resistant to common vulnerabilities including...
  • OpenMORDM

  • Referenced in 2 articles [sw33385]
  • contains two complementary components: (1) a software application programming interface (API) for connecting planning models ... critical deeply uncertain factors; and (2) a web-based visualization toolkit for exploring high-dimensional ... datasets to better understand system trade-offs, vulnerabilities, and dependencies...
  • PhoneyC

  • Referenced in 1 article [sw37387]
  • broad, poorly defended space filled with vulner-able clients. Just as honeypots enabled deep research ... user-driven network client application, such as a web browser, and be exploited ... honeyclient, meaning it is not a real application but rather an emulated client. By using ... many malicious pages. Furthermore, PhoneyC emulates specific vulnerabilities to pinpoint the attack vector. PhoneyC...
  • PixelVault

  • Referenced in 1 article [sw37377]
  • vulnerability of April 2014, which allowed the remote leakage of secret keys from HTTPS web ... library that allows the protection of existing applications with minimal modifications. Based on the results...
  • CUTE

  • Referenced in 65 articles [sw00177]
  • CUTE: a concolic unit testing engine for C...
  • Matlab

  • Referenced in 13544 articles [sw00558]
  • MATLAB® is a high-level language and interactive...
  • R

  • Referenced in 9969 articles [sw00771]
  • R is a language and environment for statistical...
  • ScaLAPACK

  • Referenced in 418 articles [sw00830]
  • ScaLAPACK is an acronym for scalable linear algebra...
  • ELECTRE

  • Referenced in 129 articles [sw02971]
  • Electre Methods. Over the last three decades a...