Year |
Citation |
Score |
2010 |
Balzarotti D, Banks G, Cova M, Felmetsger V, Kemmerer R, Robertson W, Valeur F, Vigna G. An experience in testing the security of real-world electronic voting systems Ieee Transactions On Software Engineering. 36: 453-473. DOI: 10.1109/Tse.2009.53 |
0.656 |
|
2008 |
Balzarotti D, Banks G, Cova M, Felmetsger V, Kemmerer R, Robertson W, Valeur F, Vigna G. Are your votes really counted? Testing the security of real-world electronic voting systems Issta'08: Proceedings of the 2008 International Symposium On Software Testing and Analysis 2008. 237-247. DOI: 10.1145/1390630.1390660 |
0.64 |
|
2008 |
Balzarotti D, Cova M, Felmetsger V, Jovanovic N, Kirda E, Kruegel C, Vigna G. Saner: Composing static and dynamic analysis to validate sanitization in web applications Proceedings - Ieee Symposium On Security and Privacy. 387-401. DOI: 10.1109/SP.2008.22 |
0.678 |
|
2007 |
Balzarotti D, Cova M, Felmetsger VV, Vigna G. Multi-module vulnerability analysis of web-based applications Proceedings of the Acm Conference On Computer and Communications Security. 25-35. DOI: 10.1145/1315245.1315250 |
0.716 |
|
2007 |
Cova M, Felmetsger V, Vigna G. Vulnerability analysis of Web-based applications Test and Analysis of Web Services. 363-394. DOI: 10.1007/978-3-540-72912-9_13 |
0.715 |
|
2007 |
Cova M, Balzarotti D, Felmetsger V, Vigna G. Swaddler: An approach for the anomaly-based detection of state violations in web applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4637: 63-86. |
0.705 |
|
2006 |
Cova M, Felmetsger V, Banks G, Vigna G. Static detection of vulnerabilities in x86 executables Proceedings - Annual Computer Security Applications Conference, Acsac. 269-278. DOI: 10.1109/ACSAC.2006.50 |
0.661 |
|
2006 |
Banks G, Cova M, Felmetsger V, Almeroth K, Kemmerer R, Vigna G. SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4176: 343-358. |
0.674 |
|
2005 |
Felmetsger V, Vigna G. Exploiting OS-level mechanisms to implement mobile code security Proceedings of the Ieee International Conference On Engineering of Complex Computer Systems, Iceccs. 234-243. |
0.604 |
|
Show low-probability matches. |