Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao and David Brumley, "AEG : Automatic Exploit Generation", Carnegie Mellon University, Pittsburgh, PA
Taiki Oosawa, Takeshi Matsuda, "SQL Injection attack detection method using the approximation function of zeta distribution", 2014 IEEE International Conferece on System, Man and Cybernetics(SMC), 2014.10, pp.819-824.
SANS 25, http://www.sans.org/top25-software-errors/
OWASP Top 10 - 2013, "The Ten Most Critical Web Application Security Risks", The OWASP Foundation.
Monica Catherine S, Geogen George, "S-compiler: A code vulnerability detection method", EESCO(Electrical, Electronics, Signals, Communication and Optimization) 2015 International Conference on, 2015.01, pp.1-4,
Michael Hicks, "Symbolic Excution for find bugs", University of Maryland
Michael Eddington, “Demystifying Fuzzers”, 2009.1.
Lwin Khin Shar, Lionel C. Briand, Hee Beng Kuan Tan, "Web Application Vulnerability Prediction Using Hybrid Program Analysis and Machine Learning", IEEE Transactions on Dependable and Secure Computing, Vol. 12, Issue. 6, pp.688-707.
Jun. Cai, Shangfei. Yang, Jinquan. Men, Jun He, "Automatic software vulnerability detection based on guided deep fuzzing", ICSESS(Software Engineering and Service Science) 2014 5th IEEE International Conference on, 2014.06, pp.231-234.
JUN-HO SONG, JAE-PYO PARK, MOON-SEOG JUN, "Study of Crash Analysis and Data Flow Analysis for Exploitable Assessment Method on Software", The 2016 World Congress on Information Technology Applications and Services, 2016.2
ISO 27005, http://www.27000.org/iso-27005.htm/
Huning Dai, C. Murphy, G. Kaiser, "Configuration Fuzzing for Software Vulnerability Detection", ARES(Availability, Reliability, and Security) '10 International Conference on, 2010.02, pp.525-530.
Gupta. MukeshKumar, Govil MaheshChandra, Singh. Girdhari, Sharm. Priya, "XSSDM : Towards detection and mitigation of cross-site scripting vulnerabilities in web applictions", ICACCI 2015.8 pp.2010-2015.
Gartner, http://www.gartner.com/, 2005.
Foreman Park, "Vulnerability Management", 2009.05
CWSS, http://cwe.mitre.org/cwss/cwss_v1.0.1.html/
CVSS, http://first.org/
CVE, http://cve.mitre.org/
Awad A. Younis, Yashwant K. Malaiya, Indrajit Ray, "Using Attack Surface Entry Points and Reachability Analysis to Assess the Risk of Software Vulnerability Exploitability", 2014 IEEE 15th International Symposium on High-Assurance Systems Engineering, 2014.01, pp.1-8.
Anamika Joshi , V. Geetha, "SQL Injection detection using machine Learning", ICCICCT(Control, Instrumentation, Communication and Computational Technologies), 2014 International Conference on, 2014.07, pp.1111 - 1115.
Agawal, Monica, Singh, Abhinav, "Metasploit Penetration testing Cookbook, Second Edition"
'
안전한 어플리케이션을 위한 지능형 취약점 분석 기법에 관한 연구 = A Study on Intelligent Method of Vulnerability Analysis for Secure Application'
의 유사주제(
) 논문