参考文献/References:
[1] OWASP Top10-Open Web Application Security Project.Top ten Web application security risks [EB/OL].
[2015-03-14].http://www.owasp.org.cn/owasp-project/2013top10.
[2] Wasserman G,Su Zhendong.Sound and precise analysis of Web applications for injection vulnerabilities [EB/OL].
[2015-03-14].http://web.cs.ucdavis.edu/~su/publications/pldi07.pdf.
[3] Jovanovic N,Kruegel C,Kirda E.Static analysis for detecting taint-style vulnerabilities in web applications [J].Journal of Computer Security,2010,18(5):861-907.
[4] 黄强,曾庆凯.基于信息流策略的污点传播分析及动态验证 [J].软件学报,2011,22(9):2036-2048.
[5] Ray D,Ligatti J.Defining code-injection attacks [J].Acm Sigplan Notices,2015,47(1):179-190.
[6] Tuong N,Guarnieri A,Greene S,et al.Automatically hardening web applications using precise tainting [J].Ifip Advances in Information & Communication Technology,2010,181:372-382.
[7] 王溢,李舟军,郭涛.防御代码注入式攻击的字面值污染方 [J].计算机研究与发展,2012,49(11):2414-2423.
[8] Son S,McKinley K S,Shmatikov V.Diglossia:detecting code injection attacks with precision and efficiency [EB/OL].
[2015-02-17].http://msr-waypoint.com/pubs/202166/diglossia-ccs-2013.pdf.
[9] Bandhakavi S,Bisht P,Madhusudan P.CANDID:preventing SQL injection attacks using dynamic candidate evaluations [EB/OL].
[2015-02-17].https://www.cs.uic.edu/~pbisht/files/candid-sql-injection-ccs07.pdf.
[10] Su Zhendong,Wassermann G.The essence of command injection attacks in Web applications [J].Acm Sigplan Notices,2006,41(1):372-382
[11] GitHub Inc.P6spy [EB/OL].
[2015-02-17].https://github.com/p6spy/p6spy.
[12] Benjam in Livshits.Stanford securi bench [EB/OL].
[2015-02-17].http://suif.stanford.edu/~livshits/securibench/.
[13] Aarhus University.Java string analysis [EB/OL].
[2015-02-17].http://www.brics.dk/JSA/
[14] GitHub Inc.BodgeIt [EB/OL].
[2015-07-11].http://code.google.com/p/bodgeit.