Back to Results
First PageMeta Content
Database management systems / Computer languages / Data management / Scripting languages / Monica S. Lam / SQL / Code injection / Cross-site scripting / Java / Computing / Software engineering / Cross-platform software


Securing Web Applications with Static and Dynamic Information Flow Tracking Monica S. Lam Michael Martin
Add to Reading List

Document Date: 2007-12-15 19:41:29


Open Document

File Size: 134,85 KB

Share Result on Facebook

City

San Francisco / Rockville / Using Event / Cloning / New York / Query / Taint / Event / /

Company

Moka5 Inc. / Addison-Wesley Publishing / PQL / Sun Microsystems / Knowledge-Base Systems / Program Query Languages Systems / ACM Press / Apache Software Foundation / Computer Science Press / Microsoft / P. Augustinov A. S. / WebCohort Inc. / /

Country

United States / /

/

Facility

Dynamic Information Flow Tracking Monica S. Lam Michael Martin Computer Science Department Stanford University / Building System-Specific / /

IndustryTerm

Web Application Code / cross-site / Web cache poisoning / higher level software engineering tools / Web Applications / static tool / Web-based bulletin board / web application framework / software security / possible more sophisticated software engineering tools / framework-specialized tools / web application / web vulnerabilities / web application security / Web Conference / secure web applications / Web service / open-source web applications / Web-based systems / Web Cache Poisoning Attacks / online banking / real-life applications / Web servers / Web-based applications / web application security vulnerabilities / Web developers / servlet / real-life web applications / software life cycle / representative open-source applications / widespread tools / Web Application Security Consortium / e - commerce / web security / improved software productivity / programming tools / /

Movie

Divide and Conquer / /

Organization

National Science Foundation / U.S. Securities and Exchange Commission / Stanford University / Application Defense Center / /

Person

Benjamin Livshits John Whaley / Checking Model / Monica S. Lam / S. Lam Michael Martin / Sensitive Pointer (Analysis Using Binary) / /

/

Position

Walker / application programmer for inspection / Reliability General / author / Model / Director / application programmer / representative / controller / programmer / /

Product

SQL Injection SQL injection / SQL injections / Simple SQL injection / Abstract SQL injection / Apache / SQL injection / A more complete SQL injection / Vulnerabilities SQL injection / Full SQL injection / Program Query Language / Total SQL Injection / /

ProgrammingLanguage

Datalog / Java / Java bytecode / HTML / Promela / SQL / PHP / JavaScript / /

ProvinceOrState

Maryland / New York / California / /

SportsLeague

Stanford University / /

Technology

Object-Oriented Programming / Virtual Machine / PHP / Cloning / HTML / operating systems / Boyer-Moore Type Algorithms / Flow Control / Java / HTTP / DOM / described using a Java-like syntax / /

URL

www.packetstormsecurity.org/papers/general / http /

SocialTag