2009
DOI: 10.1007/978-3-642-04062-7_25
|View full text |Cite
|
Sign up to set email alerts
|

Static and Dynamic Analysis for Web Security in Generic Format

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2009
2009
2011
2011

Publication Types

Select...
3
2
1

Relationship

3
3

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…To solve it, it is necessary to develop not only black box testing, but also white box testing. This is discussed in web application security [5]. We would like to challenge to research white box testing in Flash application.…”
Section: Resultsmentioning
confidence: 98%
See 1 more Smart Citation
“…To solve it, it is necessary to develop not only black box testing, but also white box testing. This is discussed in web application security [5]. We would like to challenge to research white box testing in Flash application.…”
Section: Resultsmentioning
confidence: 98%
“…A sandbox is isolated from the operating system, file system, network, other applications, and even other Flash A developer can set the cross domain setting permission through the method of ActionScript called Security.allowDomain. According to the research of Jeremiah Grossman in 2006 [5], 6% of the top 100 websites have unrestricted cross domain policies. The problem with sandbox is that an attacker can attack application side vulnerabilities if the website administrator sets the crossdomain.xml wrongly.…”
Section: Protection Approachmentioning
confidence: 99%
“…9, NO. 2 when executed, so the logging messages can be generated at run-time process in HTML form, and represent the traces of an individual execution path [4]. TBM works on the decomposition of tokens, so each token is encoded to a special parser code, it will then be filtered and integrated into string code.…”
Section: Soa Trend and Security Approachesmentioning
confidence: 99%
“…From an integrity perspective, the lack of a consistent checkpoint can be risky for roll-back scenarios caused by security issues. Besides, the conventional techniques require developers to learn and use a new programming paradigm, which makes the implementation difficult in realization (Wu et al, 2009a).…”
Section: Literature and Architecture Review 21 Literature Reviewmentioning
confidence: 99%
“…In order to settle these issues, a metadata strategy in supporting IVT interoperability is proposed. It achieves a generic format (Wu et al, 2009b) for language transparency, and it also envisions the unique characteristics of semantic structure in coping with web security in new-age computing.…”
Section: Literature and Architecture Review 21 Literature Reviewmentioning
confidence: 99%