San Francisco / Rockville / Using Event / Cloning / New York / Query / Taint / Event / /
Company
Moka5 Inc. / Addison-Wesley Publishing / PQL / Sun Microsystems / Knowledge-Base Systems / Program Query Languages Systems / ACM Press / Apache Software Foundation / Computer Science Press / Microsoft / P. Augustinov A. S. / WebCohort Inc. / /
Country
United States / / /
Facility
Dynamic Information Flow Tracking Monica S. Lam Michael Martin Computer Science Department Stanford University / Building System-Specific / /
IndustryTerm
Web Application Code / cross-site / Web cache poisoning / higher level software engineering tools / Web Applications / static tool / Web-based bulletin board / web application framework / software security / possible more sophisticated software engineering tools / framework-specialized tools / web application / web vulnerabilities / web application security / Web Conference / secure web applications / Web service / open-source web applications / Web-based systems / Web Cache Poisoning Attacks / online banking / real-life applications / Web servers / Web-based applications / web application security vulnerabilities / Web developers / servlet / real-life web applications / software life cycle / representative open-source applications / widespread tools / Web Application Security Consortium / e - commerce / web security / improved software productivity / programming tools / /
Movie
Divide and Conquer / /
Organization
National Science Foundation / U.S. Securities and Exchange Commission / Stanford University / Application Defense Center / /
Person
Benjamin Livshits John Whaley / Checking Model / Monica S. Lam / S. Lam Michael Martin / Sensitive Pointer (Analysis Using Binary) / / /
Position
Walker / application programmer for inspection / Reliability General / author / Model / Director / application programmer / representative / controller / programmer / /
Product
SQL Injection SQL injection / SQL injections / Simple SQL injection / Abstract SQL injection / Apache / SQL injection / A more complete SQL injection / Vulnerabilities SQL injection / Full SQL injection / Program Query Language / Total SQL Injection / /
Object-Oriented Programming / Virtual Machine / PHP / Cloning / HTML / operating systems / Boyer-Moore Type Algorithms / Flow Control / Java / HTTP / DOM / described using a Java-like syntax / /