iohehe / papers_collection

9 stars 1 forks source link

Papers

  1. Jovanovic N, Kruegel C, Kirda E. Pixy: A static analysis tool for detecting web application vulnerabilities. In: 2006 IEEE Symposium on Security and Privacy (S&P’06). IEEE; 2006. p. 6–pp.
  2. F. Yamaguchi, M. Lottmann, and K. Rieck, “Generalized vulnerability extrapolation using abstract syntax trees,” in Proceedings of the 28th Annual Computer Security Applications Conference. ACM, 2012, pp. 359–368.
  3. F. Yamaguchi, N. Golde, D. Arp, and K. Rieck, “Modeling and discovering vulnerabilities with code property graphs,” in Proceedings of the 35th IEEE Symposium on Security and Privacy, SP 2014, pp. 590–604, San Jose, CA, USA, May 2014.
  4. Fabian Yamaguchi, Alwin Maier, Hugo Gascon, and Konrad Rieck. “Automatic inference of search patterns for taint-style vulnerabilities”. In: Proc. IEEE Security & Privacy. 2015, pp. 797–812 (cit. on pp. 2, 65, 83, 88).
  5. BACKES, M., RIECK, K., SKORUPPA, M., STOCK, B., AND YAMAGUCHI, F. Efficient and flexible discovery of php application vulnerabilities. In Security and Privacy (EuroS&P), 2017 IEEE European Symposium on (2017), IEEE, pp. 334–349.
  6. Unruh, T., Shastry, B., Skoruppa, M., Maggi, F., Rieck, K., Seifert, J. P., & Yamaguchi, F. (2017). “Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery”. In 11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17).
  7. Z. Li, D. Zou, S. Xu, H. Jin, H. Qi, and J. Hu, “VulPecker: An automated vulnerability detection system based on code similarity analysis,” in Proceedings of the 32nd Annual Conference on Computer Security Applications. ACM, 2016, pp. 201–213.
  8. Kangjie Lu, Aditya Pakki, Qiushi Wu Detecting Missing-Check Bugs via Semantic- and Context-Aware Criticalness and Constraints Inferences
  9. Alhuzali A, Gjomemo R, Eshete B, Venkatakrishnan V. NAVEX: Precise and Scalable Exploit Generation for Dynamic Web Applications. In: 27th USENIX Security Symposium (USENIX Security 18); 2018. p. 377–392.
  10. Y.Minamid, Static approximation of dynamically generated web pages, in WWW'05:Proceedings of the 14th International Conference on World Wide Web. New York,NY,USA: ACM Press, 2005, pp.432-441
  11. Y.Xie and A.Aiken, Static Detection of Security Vulnerabilities in Scripting Languages, http://glide.stanford.edu/yichen/research/sec.ps, 2006.
  12. Kim, Seulbae et al. “VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery.” 2017 IEEE Symposium on Security and Privacy (SP) (2017): 595-614.
  13. Nashaat, Mona et al. “Detecting Security Vulnerabilities in Object-Oriented PHP Programs.” 2017 IEEE 17th International Working Conference on Source Code Analysis and Manipulation (SCAM) (2017): 159-164.
  14. Khalaf, Aya et al. “A Machine Learning Approach for Classifying Faults in Microgrids using Wavelet Decomposition.” 2019 IEEE 29th International Workshop on Machine Learning for Signal Processing (MLSP) (2019): 1-6.
  15. Medeiros, Ibéria et al. “DEKANT: a static analysis tool that learns to detect web application vulnerabilities.” ISSTA 2016 (2016).
  16. Halfond, William G. J. and A. Orso. “AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks.” ASE '05 (2005).
  17. Dahse, J. et al. “Code Reuse Attacks in PHP: Automated POP Chain Generation.” Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (2014): n. pag.
  18. Paulsen, Brandon et al. “Debreach: Mitigating Compression Side Channels via Static Analysis and Transformation.” 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE) (2019): 899-911.
  19. Wang, Huanting et al. “Combining Graph-Based Learning With Automated Data Collection for Code Vulnerability Detection.” IEEE Transactions on Information Forensics and Security 16 (2021): 1943-1958.
  20. Dahse, J. and T. Holz. “Simulation of Built-in PHP Features for Precise Static Code Analysis.” NDSS (2014).(AND RIPS second order)
  21. Moor, O. et al. “Keynote Address: .QL for Source Code Analysis.” Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007) (2007): 3-16.
  22. Li, Zhenmin and Yuanyuan Zhou. “PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code.” ESEC/FSE-13 (2005).
  23. Brown, Fraser et al. “Sys: A Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code.” USENIX Security Symposium (2020).
  24. Yu, Fang et al. “Stranger: An Automata-Based String Analysis Tool for PHP.” TACAS (2010).
  25. Balzarotti, D. et al. “Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications.” 2008 IEEE Symposium on Security and Privacy (sp 2008) (2008): 387-401.
  26. Yamaguchi, Fabian et al. “Chucky: exposing missing checks in source code for vulnerability discovery.” Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (2013): n. pag.
  27. Yamaguchi, Fabian et al. “Modeling and Discovering Vulnerabilities with Code Property Graphs.” 2014 IEEE Symposium on Security and Privacy (2014): 590-604.
  28. Alexander Bulekov et al. “Saphire: Sandboxing PHP Applications with Tailored System Call Allowlists”.
  29. Alhuzali, Abeer et al. “Chainsaw: Chained Automated Workflow-based Exploit Generation.” Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (2016): n. pag.
  30. Nunes, P. et al. “phpSAFE: A Security Analysis Tool for OOP Web Application Plugins.” 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (2015): 299-306.
  31. Zheng, Yunhui et al. “Z3-str: a z3-based string solver for web application analysis.” ESEC/FSE 2013 (2013).
  32. Prasse, Paul et al. “Learning to identify concise regular expressions that describe email campaigns.” J. Mach. Learn. Res. 16 (2015): 3687-3720.
  33. Eriksson, B. et al. “Black Widow: Blackbox Data-driven Web Scanning.” (2021).
  34. Trinh, Minh-Thai et al. “S3: A Symbolic String Solver for Vulnerability Detection in Web Applications.” Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (2014): n. pag.
  35. Kiezun, Adam et al. “HAMPI: a solver for string constraints.” ISSTA (2009).
  36. Schwartz, E. J. et al. “All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask).” 2010 IEEE Symposium on Security and Privacy (2010): 317-331.
  37. Steffens, M. et al. “Don't Trust The Locals: Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild.” NDSS (2019).
  38. Daniil Sadyrin et al. “Application of Graph Databases for Static Code Analysis of Web-Applications”
  39. Yan, H. et al. “Machine-Learning-Guided Typestate Analysis for Static Use-After-Free Detection.” Proceedings of the 33rd Annual Computer Security Applications Conference (2017): n. pag.
  40. Grech, N. and Y. Smaragdakis. “P/Taint: unified points-to and taint analysis.” Proceedings of the ACM on Programming Languages 1 (2017): 1 - 28.
  41. Buyukkayhan, A. S. et al. “What’s in an Exploit? An Empirical Analysis of Reflected Server XSS Exploitation Techniques.” (2020).
  42. Huang, Yao-Wen et al. “Securing web application code by static analysis and runtime protection.” WWW '04 (2004).
  43. Wassermann, Gary and Z. Su. “Sound and precise analysis of web applications for injection vulnerabilities.” PLDI '07 (2007).
  44. Huang, Yao-Wen et al. “Verifying Web applications using bounded model checking.” International Conference on Dependable Systems and Networks, 2004 (2004): 199-208.
  45. Li, Yue, Tian Tan and Jingling Xue. “Understanding and Analyzing Java Reflection.” ACM Transactions on Software Engineering and Methodology (TOSEM) 28 (2016): 1 - 50.
  46. Hooimeijer, Pieter, Benjamin Livshits, David A. Molnar, P. Saxena and Margus Veanes. “Fast and Precise Sanitizer Analysis with BEK.” USENIX Security Symposium (2011).
  47. Späth, Johannes, Karim Ali and Eric Bodden. “Context-, flow-, and field-sensitive data-flow analysis using synchronized Pushdown systems.” Proceedings of the ACM on Programming Languages 3 (2019): 1 - 29.
  48. Bian, Pan, Bin Liang, Jianjun Huang, Wenchang Shi, Xidong Wang and Jian Zhang. “SinkFinder: harvesting hundreds of unknown interesting function pairs with just one seed.” Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (2020): n. pag.
  49. Schuckert, Felix, Basel Katt and Hanno Langweg. “Difficult SQLi Code Patterns for Static Code Analysis Tools.” (2020).
  50. Li, Penghui. “On the Feasibility of Automated Built-in Function Modeling for PHP Symbolic Execution.” (2021).
  51. Livshits, Benjamin, Aditya V. Nori, Sriram K. Rajamani and Anindya Banerjee. “Merlin: specification inference for explicit information flow problems.” PLDI '09 (2009).
  52. Shcherbakov, Mikhail and Musard Balliu. “SerialDetector: Principled and Practical Exploration of Object Injection Vulnerabilities for the Web.” NDSS (2021).
  53. Minamide, Yasuhiko. “Static approximation of dynamically generated Web pages.” WWW '05 (2005).
  54. Lee, Taekjin, Seongil Wi, Suyoung Lee and Sooel Son. “FUSE: Finding File Upload Bugs via Penetration Testing.” NDSS (2020).
  55. Lekies, Sebastian, Krzysztof Kotowicz, Samuel Groß, Eduardo A. Vela Nava and Martin Johns. “Code-Reuse Attacks for the Web: Breaking Cross-Site Scripting Mitigations via Script Gadgets.” Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (2017): n. pag.
  56. Rahaman, Sazzadur, Ya Xiao, Sharmin Afrose, Fahad Shaon, Ke Tian, Miles Frantz, Murat Kantarcioglu and Danfeng Daphne Yao. “CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects.” Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (2019): n. pag.
  57. Li, Penghui and Wei Meng. “LChecker: Detecting Loose Comparison Bugs in PHP.” Proceedings of the Web Conference 2021 (2021): n. pag.
  58. Li, Z., Deqing Zou, Shouhuai Xu, Xinyu Ou, Hai Jin, Sujuan Wang, Zhijun Deng and Yuyi Zhong. “VulDeePecker: A Deep Learning-Based System for Vulnerability Detection.” ArXiv abs/1801.01681 (2018): n. pag.
  59. Pellegrino, Giancarlo, Martin Johns, Simon Koch, Michael Backes and Christian Rossow. “Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs.” Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (2017): n. pag.
  60. Yang, Kevin K., Zachary Wu and Frances H. Arnold. “Machine-learning-guided directed evolution for protein engineering.” Nature Methods (2019): 1-8.
  61. Medeiros, I., Neves, N.F., & Correia, M.P. (2016). Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining. IEEE Transactions on Reliability, 65, 54-69.
  62. Huang, J., Zhang, J., Liu, J., Li, C., & Dai, R. (2021). UFuzzer: Lightweight Detection of PHP-Based Unrestricted File Upload Vulnerabilities Via Static-Fuzzing Co-Analysis. 24th International Symposium on Research in Attacks, Intrusions and Defenses.
  63. Shar, L.K., & Tan, H.B. (2012). Automated removal of cross site scripting vulnerabilities in web applications. Inf. Softw. Technol., 54, 467-478.
  64. Pellegrino, Giancarlo, Constantin Tschürtz, Eric Bodden and Christian Rossow. “jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications.” RAID (2015).
  65. Zhang, Hang, Weiteng Chen, Yu Hao, Guoren Li, Yizhuo Zhai, Xiaocheng Zou and Zhiyun Qian. “Statically Discovering High-Order Taint Style Vulnerabilities in OS Kernels.” Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (2021): n. pag.
  66. Park, Sunnyeo and Suman Sekhar Jana. “FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities.” (2021).
  67. Calzavara, Stefano et al. “Mitch: A Machine Learning Approach to the Black-Box Detection of CSRF Vulnerabilities.” 2019 IEEE European Symposium on Security and Privacy (EuroS&P) (2019): 528-543.
  68. Balzarotti, D. et al. “Multi-module vulnerability analysis of web-based applications.” CCS '07 (2007).
  69. Shar, Lwin Khin, Lionel Claude Briand and Hee Beng Kuan Tan. “Web Application Vulnerability Prediction Using Hybrid Program Analysis and Machine Learning.” IEEE Transactions on Dependable and Secure Computing 12 (2015): 688-707.
  70. Perl, H., Dechand, S., Smith, M., Arp, D., Yamaguchi, F., Rieck, K., Fahl, S., & Acar, Y.G. (2015). VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security.
  71. Yamaguchi, F., Lottmann, M., & Rieck, K. (2012). Generalized vulnerability extrapolation using abstract syntax trees. ACSAC '12.
  72. Chibotaru, V., Bichsel, B., Raychev, V., & Vechev, M.T. (2019). Scalable taint specification inference with big code. Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation.
  73. Staicu, C., Torp, M.T., Schäfer, M., Møller, A., & Pradel, M. (2020). Extracting Taint Specifications for JavaScript Libraries. 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE), 198-209.
  74. DeepTective
  75. Shahriar, H., & Haddad, H.M. (2016). Object injection vulnerability discovery based on latent semantic indexing. Proceedings of the 31st Annual ACM Symposium on Applied Computing.
  76. Kassar, F.A., Clerici, G., Compagna, L., Balzarotti, D., & Yamaguchi, F. (2022). Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications. Proceedings 2022 Network and Distributed System Security Symposium.
  77. Wi, S., Woo, S., Whang, J.J., & Son, S. (2022). HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs. Proceedings of the ACM Web Conference 2022.
  78. Schuckert Felix, Basel Katt, and Hanno Langweg. "Difficult XSS Code Patterns for Static Code Analysis Tools." Computer Security. Springer, Cham, 2019. 123-139.
  79. Schuckert Felix, Basel Katt, and Hanno Langweg. "Diffcult SQLi Code Patterns for Static Code Analysis Tools." Norsk IKT-konferanse for forskning og utdanning. No. 3. 2020.
  80. Ping, C. (2017). A second-order SQL injection detection method. 2017 IEEE 2nd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), 1792-1796.
  81. Luo, C., Li, P., & Meng, W. (2022). TChecker: Precise Static Inter-Procedural Analysis for Detecting Taint-Style Vulnerabilities in PHP Applications. Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security.
  82. FICS

PHP研究线

JS研究线

Java污点分析

Python

Code Mining

程序分析技术

flaw detection base on query languages and graphs

1994

Black-box Web Application Scanner

Vul: CSRF

Vul: Code Reuse(Deserialization)

PHP

JAVA

.NET