|
[1]
|
2019CWE/SANS Top 25 Most Dangerous Software Errors
https://cwe.mitre.org/top25/archive/2019/2019_cwe_top25.html
|
|
[2]
|
Shanmugam, J. and Ponnavaikko, M. (2007) Xss Application Worms: New Internet Infestation and Optimized Protective Measures. Eighth ACIS International Con-ference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007), 3, 1164-1169. [Google Scholar] [CrossRef]
|
|
[3]
|
Wit, E. and McClure, J. (2004) Statistics for Microar-rays: Design, Analysis, and Inference. 5th Edition, John Wiley & Sons Ltd., Chichester, 5-18.
|
|
[4]
|
Chun, S., Jing, C., Changzhen, H., et al. (2016) A XSS Attack Detection Method based on Skip List. International Journal of Security and its Applications, 10, 95-106. [Google Scholar] [CrossRef]
|
|
[5]
|
Gupta, S. and Gupta, B.B. (2016) CSSXC: Context-Sensitive Sanitization Framework for Web Applications against XSS Vulnerabilities in Cloud Envi-ronments. Procedia Computer Science, 85, 198-205. [Google Scholar] [CrossRef]
|
|
[6]
|
Schwenk, J., Niemietz, M. and Mainka, C. (2017) Same-Origin Policy: Evaluation in Modern Browsers. 26th {USENIX} Security Symposium {USENIX} Security, 17, 713-727.
|
|
[7]
|
Barth, A. (2011) Rfc 6265-http State Management Mechanism. Internet Engineering Task Force (IETF), April 2011, 2070-1721. [Google Scholar] [CrossRef]
|
|
[8]
|
Di Lucca, G.A., Fasolino, A.R., Mastoianni, M. and Tramontana, P. (2004) Identifying Cross Site Scripting Vulnerabilities in Web Applications. Proceedings. Sixth IEEE In-ternational Workshop on Web Site Evolution, Chicago, IL, 71-80. [Google Scholar] [CrossRef]
|
|
[9]
|
Fogie, S., Grossman, J., Hansen, R., et al. (2007) XSS Attacks: Cross Site Scripting Exploits and Defense. Syngress Publishing, Burlington. [Google Scholar] [CrossRef]
|
|
[10]
|
Wassermann, G. and Su, Z. (2008) Static Detection of Cross-Site Scripting Vulnerabilities. 30th International Conference on Software Engineering (ICSE 2008), Leipzig, 10-18 May 2008, 171-180.
|
|
[11]
|
王岩, 程绍银, 蒋凡. 自动化检测Android应用反射型跨站脚本漏洞的方法[J]. 计算机系统应用, 2015, 24(7): 195-199.
|
|
[12]
|
窦永富, 崔为红. 应用程序安全设计探析[J]. 计算机系统应用, 2006, 15(9): 83-86.
|
|
[13]
|
Lekies, S., Stock, B. and Johns, M. (2013) 25 Million Flows Later—Large-Scale Detection of DOM-Based XSS. Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, 4-8 November 2013, 1193-1204. [Google Scholar] [CrossRef]
|