1 |
"Plans for implementing the dissemination of HTML5," Korea Communications Commission, July. 2012, http://www.kcc.go.kr/user.do?mode=view&page=A05030000&dc=K00000001&boardId=1113&boardSeq=34309
|
2 |
"A vocabulary and associated APIs for HTML and XHTML, W3C," W3C Recommendation, October. 2014, http://www.w3.org/TR/html5
|
3 |
"Security issues in environment of the New HTML5 Web services," Korea Internet & Security Agency, Internet & Security Focus KISA Report, December. 2013, http://www.kisa.or.kr/public/library/IS_View.jsp?mode=view&p_No=158&b_No=158&d_No=117&cPage=19&ST=T&SV=
|
4 |
Ministry of government administration and home affairs, "Exposure Guideline for Web pages personal information," October. 2014, http://www.privacy.go.kr/nns/ntc/selectBoardArticle.do?nttId=5952
|
5 |
OWASP Top 10 Privacy Risks Project, " https://www.owasp.org/images/0/0a/OWASP_Top_10_Privacy_Countermeasures_v1.0.pdf ," April. 2016.
|
6 |
"PERSONAL INFORMATION PROTECTION ACT," Korea Ministry of Government Legislation, http://www.law.go.kr/lsIn foP.do?lsiSeq=142563&chrClsCd=0102 03&urlMode=engLsInfoR&viewCls=en gLsInfoR#0000
|
7 |
West, William, and S.M. Pulimood, "Analysis of privacy and security in HTML5 web storage," Journal of Computing Sciences in Colleges vol.27, no.3, pp.80-87, 2012.
|
8 |
H. Kim, S. Lee and J. Kim, "Exploring and mitigating privacy threats of HTML5 geolocation API," Proceedings of the 30th Annual Computer Security Applications Conference. ACM, pp. 306-315, December. 2014.
|
9 |
G. Dong, Y. Zhang, X. Wang, P. Wang and L. Liu, "Detecting cross site scripting vulnerabilities introduced by HTML5," In Computer Science and Software Engineering (JCSSE), 11th International Joint Conference on IEEE, pp. 319-323, May. 2014.
|
10 |
D. Bates, A. Barth, and C. Jackson, "Regular expressions considered harmful in client-side XSS filters," In Proceedings of the 19th international conference on World wide web. ACM, pp. 91-100, April. 2010.
|
11 |
D. Gol and N. Shah, "Web Application security tool to identify the different Vulnerabilities using RUP model," International Journal of Emerging Trends in Electrical and Electronics (IJETEE), vol.11, no.2, June. 2015.
|
12 |
H.L. Choo, S. Oh, J. Jung and H. Kim, "The Behavior-Based Analysis Techniques for HTML5 Malicious features," In Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2015 9th International Conference on. IEEE, pp. 436-440, July. 2015.
|
13 |
CAPEC, Common Attack Pattern Enumeration and Classification, http://capec.mitre.org/index.html
|
14 |
CWE, Common Weakness Enumeration, https://cwe.mitre.org
|
15 |
K. Tsipenyuk, B. Chess and G. McGraw, "Seven pernicious kingdoms: A taxonomy of software security errors," IEEE Security & Privacy, vol.3, no.6, pp.81-84, 2005.
DOI
|