Computer Science ›› 2017, Vol. 44 ›› Issue (Z11): 322-328.doi: 10.11896/j.issn.1002-137X.2017.11A.068
Previous Articles Next Articles
SUN Ya-jing, ZHAO Xu, YAN Xue-xiong and WANG Qing-xian
[1] BHARGAVAN K,DELIGNAT L A,MAFFEIS S.DefensiveJavaScript[M]∥Foundations of Security Analysis and Design VII.Springer International Publishing,2014:88-123. [2] TRIPP O,FERRARA P,PISTOIA M.Hybrid security analysis of web javascript code via dynamic partial evaluation[C]∥Proceedings of the 2014 International Symposium on Software Testing and Analysis.ACM,2014:49-59. [3] POLITZ J G,ARJUN G,SHRIRAM K.Typed-based verification of Web sandboxes[J].Journal of Computer Security,2014,2(4):511-565. [4] MAASS M,SALES A,CHUNG B,et al.A systematic analysis of the science of sandboxing[J].BMC Evolutionary Biology ,2016,2(3):e43. [5] JavaScript and the Document Object Model.http://www.ibm.com/developerworks/web/library/wa-jsdom. [6] The Browser Object Model.http://msdn.microsoft.com/en-us/library/ms952643.aspx. [7] ECMAScript Language Specification 2015.http://www.ecma-international.org/publications/files/ECMA-ST/Ecma-262.pdf. [8] DOUGLAS C.ADsafe.http://www.adsafe.org. [9] MARK S,MILLER S,BEN L,et al.Caja:Safe active content in sanitized JavaScript.http://google-caja,googlecode.com/files/caja-spec-2008-06-07.pdf. [10] Facebook.FBJS.http://developers.facebook.com/docs/fbjs. [11] SERGIO M,MITCHELL J C,TALY A.Isolating JavaScriptwith filters,rewriting,and wrapper [C]∥European Symposium on Research in Computer Security.Springer Berlin Heidelberg,2009:505-522. [12] TALY A,ERLINGSSON ,MITCHELL J C,et al.Automated analysis of security-critical javascript apis[C]∥ 2011 IEEE Symposium on Security and Privacy (SP).IEEE,2011:363-378. [13] POLITZ J G,SPIRIDON A E,ARJUN G,et al.ADsafety:Typed-based verification of JavaScript sandboxing[C]∥Proceedings of the 20th USENIX Conference on Security.2011. [14] POLITZ J G,ARJUN G,SHRIRAM K,Semantics and Types for Objects with First-Class Member Names[M]∥Workshop on Foundations of Object-Oriented Languages(FOOL).2012:15-22. [15] SAXENA P,AKHAWE D,HANNA S,et al.A symbolic execution framework for javascript[C]∥2010 IEEE Symposium on Security and Privacy (SP).IEEE,2010:513-528. [16] LI Y F,PARAMJIT K D,DAVID L D.Two decades of Web application testing-A Survey of recent advances[J].Information System,2014,43:20-54. [17] DANIEL M,JAMES W.Choosing Scrapy[J].Journal of Computing Sciences in Colleges,2015,31(1):83-89. |
No related articles found! |
|