Browse > Article

자바스크립트 웹 앱 분석과 결함 검출  

Ryu, Seok-Yeong (한국과학기술원)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. Kang and S. Ryu. "Formal Specification of a JavaScript Module System", Proceedings of the Conference on Object-Oriented Programming, Systems, Languages, and Applications, pp. 621-638, 2012.
2 C. Park et al. "All About the with Statement in JavaScript: Re-moving with Statements in JavaScript Applications", Proceedings of the Symposium on Dynamic Languages, pp. 73-84. 2013.
3 W. Cheung et al. "Development Nature Matters: An Empirical Study of Code Clones in JavaScript Applications", Empirical Software Engineering, pp. 1-48, 2015.
4 C. Park and S. Ryu. "Scalable and Precise Static Analysis of JavaScript Applications via Loop-Sensitivity", Proceedings of the European Conference on Object-Oriented Programming, pp. 735-756, 2015.
5 C. Park et al. "Static Analysis of JavaScript Web Applications in the Wild via Practical DOM Modeling", Proceedings of the International Conference on Automated Software Engineering, pp. 552-562, 2015.
6 S. Bae et al. "SAFE_WAPI: Web API Misuse Detector for Web Applications", Proceedings of the International Symposium on Foundations of Software Engineering, pp. 507-517, 2014.
7 Y. Ko et al. "Practically Tunable Static Analysis Framework for Large-Scale JavaScript Applications", Proceedings of the International Conference on Automated Software Engineering, pp. 541-551, 2015.
8 J. Park et al. "Battles with False Positives in Static Analysis of JavaScript Web Applications in the Wild", Proceedings of the International Conference on Software Engineering, 2016.
9 TIOBE Software. 2015. TIOBE Index for November 2015. www.tiobe.com/index-php/content/paperinfo/tpci/index.html
10 G. Richards et al. "An Analysis of the Dynamic Behavior of JavaScript Programs", Proceedings of Conference on Programming Language Design and Implementation, pp. 1-12, 2010.
11 M. Pradel et al. "TypeDevil: Dynamic Type Inconsistency Analysis for JavaScript", Proceedings of the International Conference on Software Engineering, pp. 314-324, 2015.
12 C. Yue and H. Wang, "Characterizing Insecure JavaScript Practices on the Web", Proceedings of the International Conference on World Wide Web, pp. 960-970, 2009.
13 D. Jang et al. "An Empirical Study of Privacy-violating Information Flows in JavaScript Web Applications", Proceedings of the Conference on Computer and Communications Security, pp. 270-283, 2010.
14 N. Nikiforakis et al. "You Are What You Include: Large-scale Evaluation of Remote JavaScript Inclusions", Proceedings of the Conference on Computer and Communications Security, pp. 736-747, 2012.
15 ECMA. ECMA-262: ECMAScript 2015 Language Specification, 6th Edition. 2015.
16 M. Pradel and K. Sen. "The Good, the Bad, and the Ugly: An Empirical Study of Implicit Type Conversions in JavaScript", Proceedings of the European Conference on Object-Oriented Programming, pp. 519-541, 2015.
17 Jensen et al. "Remedying the Eval That Men Do. In Proc. of International Symposium on Software Testing and Analysis", pp. 34-44, 2012.
18 C. Anderson et al. "Towards Type Inference for JavaScript", Proceedings of the European Conference on Object-Oriented Programming, pp. 428-452. 2005.
19 P. Thiemann. "Towards a Type System for Analyzing JavaScript Programs", Proceedings of European Symposium on Programming, pp. 408-422, 2005.
20 Jensen et al. "Type Analysis for JavaScript", Proceedings of the International Symposium on Static Analysis, pp. 238-255, 2009.
21 S. Guarnieri et al. "Saving the World Wide Web from Vulnerable JavaScript", Proceedings of the International Symposium on Software Testing and Analysis, pp. 177-187, 2011.
22 R. Chugh et al. "Staged Information Flow for JavaScript", Proceedings of the Conference on Programming Language Design and Implementation, pp. 50-62, 2009.
23 S. Bandhakavi et al. "VEX: Vetting Browser Extensions for Security Vulnerabilities", Proceedings of the USENIX Conference on Security. pp. 22-22, 2010.
24 O. Tripp et al. "Hybrid Security Analysis of Web JavaScript Code via Dynamic Partial Evaluation", Proceedings of the International Symposium on Software Testing and Analysis, pp. 49-59, 2014.
25 H. Lee et al. "SAFE: Formal Specification and Implementation of a Scalable Analysis Framework for ECMAScript", Proceedings of the International Workshop on Foundations of Object-Oriented Languages, 2012.
26 PLRG@KAIST. "SAFE: JavaScript Analysis Framework", http://safe.kaist.ac.kr, 2013.
27 Mozilla Developer Network. "About JavaScript", 2005.
28 P. Cousot and R. Cousot. "Abstract Interpretation: A Unified Lattice Model for Static Analysis of Programs by Construction or Approximation of Fixpoints", Proceedings of the Symposium on Principles of Programming Languages, pp. 238-252, 1977.