Back to Results
First PageMeta Content
Risk / Hacking / Software testing / Vulnerability / Computer network security / Monica S. Lam / Application security / Cross-site scripting / Java / Computing / Cyberwarfare / Computer security


Document Date: 2006-12-03 22:15:22


Open Document

File Size: 1,66 MB

Share Result on Facebook

Event

Natural Disaster / /

Facility

University Committee / Tel Aviv University / GRADUATE STUDIES OF STANFORD UNIVERSITY / Amer Divan / /

IndustryTerm

cross-site / compiler infrastructure / application server / Web-based applications / call graph construction algorithm / extensible applications / revision history mining / Web application / Web application security / conservative static solution / large e-commerce sites / large real-life benchmark applications / large real-life Web-based Java applications / compiler-based solution / Web application vulnerabilities / /

Organization

University Committee on Graduate Studies / National Science Foundation / STANFORD UNIVERSITY / Tel Aviv University / Stanford Computer Science Department / /

Person

Elena Vileshina / Mark Dilman / Wei Li / Sofya Pogreb / Chris Unkel / Brian Chess / Billy Collins / John Whaley / John Mitchell / Michael Martin / Dan Boneh / Ramesh Chandra / Tom Zimmerman / Ben DeAngelo / Paul Thohey / Ted Kremenek / Ron Burg / Iddo Lev / Brian Murphy / Jeff Ullman / Alexander Aiken / Alex Aiken / Jean-Gabriel Morard / Benjamin Livshits / David Heine / Monica S. Lam / Dawson Engler / Amit Klein / Andreas Zeller / /

Position

researcher position / advisor / Professor / Principal Adviser / /

Product

SQL injections / /

ProgrammingLanguage

SQL / Java / /

Technology

Java / call graph construction algorithm / /

SocialTag