2008
DOI: 10.1016/j.infsof.2007.05.004
|View full text |Cite
|
Sign up to set email alerts
|

An approach for the maintenance of input validation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 28 publications
0
5
0
Order By: Relevance
“…It is also a key to defend security attacks against Web applications. Both specification-based and code-based approaches have been proposed for testing the adequacy of input validation schemes [13,14,15,16,17,18,19]. Specification-based input validation testing approaches generate test cases with the aim of exercising valid and invalid input conditions as complete as possible [13,14,15,18].…”
Section: B Input Validation and Security Testing Approachmentioning
confidence: 99%
“…It is also a key to defend security attacks against Web applications. Both specification-based and code-based approaches have been proposed for testing the adequacy of input validation schemes [13,14,15,16,17,18,19]. Specification-based input validation testing approaches generate test cases with the aim of exercising valid and invalid input conditions as complete as possible [13,14,15,18].…”
Section: B Input Validation and Security Testing Approachmentioning
confidence: 99%
“…for vulnerability signatures (Brumley et al 2006), path conditions (Snelting et al 2006), input validation (Liu and Kuan Tan 2008), reducing programs for model checking (Shacham et al 2007) and for witnesses for illicit information flow (Hammer and Snelting 2009). Such applications can benefit from chopping algorithms that are as precise as possible (i.e.…”
Section: Introductionmentioning
confidence: 99%
“…The work presented in this thesis has been published in [110][111][112][113][114]. It has the following three major contributions.…”
Section: Major Contributionsmentioning
confidence: 99%
“…The proposed approaches are established based on the techniques of program analysis, program slicing and software testing augmented with empirical properties. The work has been published in [110][111][112][113][114].…”
Section: Conclusion 71 Conclusionmentioning
confidence: 99%