1 |
http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
|
2 |
김성락, "A Study of Web Application Attack Detection extended ESM Agent," 한국컴퓨터정보학회논문지, 제 12권, 제 1호, pp. 161-168, 2008.
|
3 |
장문수, 오창석, "Web Application Attack Prevention by Traffic Analysis," 한국컴퓨터정보학회논문지, 제 13권, 제 3호, pp. 139-146, 2008.
|
4 |
V. Benjamin-Livshits, S. Monica, "Finding Security Vulnerabilities in Java Applications with Static Analysis," Technical Report, Dept. Computer Science, Stanford University, 2005.
|
5 |
F. Jacobs and B. Joosen, "Software Security: Experiments on the .NET Common Language Run-time and the Shared Source Common Language Infrastructure," Software : IEE Proceedings, vol. 150, issue 5, pp. 303-307, 2003.
DOI
ScienceOn
|
6 |
J. Bau, E. Bursztein, D. Gupta, and J. Mitchell, " State of the Art: Automated Black-Box Web Application Vulnerability Testing," 2010 IEEE Symposium on Security and Privacy, pp. 332-345, 2010.
|
7 |
C. Vanden-Berghe, F. Piessens, and J. Riordan, "A Vulnerability Taxonomy Methodology applied to the Web Services," Proc. the 10th Nordic Workshop on Secure IT Systems, 2005
|
8 |
OWASP(Open Web Application Security Project), http://www.owasp.org
|
9 |
WASC(Web Application Security Consortium), http://webappsec.org
|
10 |
http://www.kisa.or.kr/notice/noticeView.jsp? mode =view&b_No=4&d_No=189
|