Zhang B, Li J, Ren J and Huang G.
(2021). Efficiency and Effectiveness of Web Application Vulnerability Detection Approaches: A Review. ACM Computing Surveys. 54:9. (1-35). Online publication date: 31-Dec-2022.
Liu Z, Zhao H, Li S, Li Q, Wei T and Wang Y. Privilege-Escalation Vulnerability Discovery for Large-scale RPC Services. Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security. (565-577).
Ben Fadhel A, Bianculli D and Briand L. Model-driven run-time enforcement of complex role-based access control policies. Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering. (248-258).
Compagna L, dos Santos D, Ponta S and Ranise S. Aegis. Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy. (321-328).
Bocić I and Bultan T. Finding access control bugs in web applications with CanCheck. Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering. (155-166).
Zhu J, Chu B and Lipford H. Detecting Privilege Escalation Attacks through Instrumenting Web Application Source Code. Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies. (73-80).
Møller A and Schwarz M.
(2014). Automated Detection of Client-State Manipulation Vulnerabilities. ACM Transactions on Software Engineering and Methodology. 23:4. (1-30). Online publication date: 5-Sep-2014.
Li X and Xue Y.
(2014). A survey on server-side approaches to securing web applications. ACM Computing Surveys. 46:4. (1-29). Online publication date: 1-Apr-2014.
Li X, Si X and Xue Y. Automated black-box detection of access control vulnerabilities in web applications. Proceedings of the 4th ACM conference on Data and application security and privacy. (49-60).
Gauthier F, Lavoie T and Merlo E. Uncovering access control weaknesses and flaws with security-discordant software clones. Proceedings of the 29th Annual Computer Security Applications Conference. (209-218).
Zheng Y, Zhang X and Ganesh V. Z3-str: a z3-based string solver for web application analysis. Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering. (114-124).
Xie T, Zhang L and Mei H.
(2013). Report on the international symposium on high confidence software (ISHCS 2011/2012). ACM SIGSOFT Software Engineering Notes. 38:4. (27-33). Online publication date: 12-Jul-2013.
Zheng Y and Zhang X. Path sensitive static analysis of web applications for remote code execution vulnerability detection. Proceedings of the 2013 International Conference on Software Engineering. (652-661).
Muthukumaran D, Jaeger T and Ganapathy V. Leveraging "choice" to automate authorization hook placement. Proceedings of the 2012 ACM conference on Computer and communications security. (145-156).
Zheng Y and Zhang X. Static detection of resource contention problems in server-side scripts. Proceedings of the 34th International Conference on Software Engineering. (584-594).