参考文献/References:
[1] OWASP F.OWASP top ten project[EB/OL].[2016-05-23] .https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project.
[2] 乐德广,李鑫,龚声蓉,等.新型二阶 SQL 注入技术研究[J].通信学报,2015,36(增刊1):85-93.DOI:10.11959/j.issn.1000-436x.2015285.
[3] AMIT Y,BESKROVNY E,TRIPP O.Detection of second order vulnerabilities in web services: US, 20130167237A1[P].2013-06-27.
[4] DAHSE J,HOLZ T.Static detection of second-order vulnerabilities in web applications[C]//23rd USENIX Security Symposium.San Diego:USENIX,2014:989-1003.
[5] 闫璐.Web 应用二阶 SQL 注入漏洞检测方法研究[D].天津:天津大学,2014:1-39.
[6] SWARUP S,KAPOOR R K.Web vulnerability scanner(WVS): A tool for detecting web application vulnerabilities[J].International Journal of Engineering Research,2014,3(2):126-131.DOI:10.17950/ijer/v3s2/219.
[7] VIEGA J,BLOCH J T,KOHNO Y,et al.ITS4: A static vulnerability scanner for C and C++ code[C]//16th Annual Conference of Computer Security Applications.New York:IEEE Press,2000:257-267.
[8] 克拉克.SQL注入攻击与防御[M].北京:清华大学出版社,2013:100-101.
[9] JOVANOVIC N,KRYEGEL C,KIRDA E.Pixy: A static analysis tool for detecting web application vulnerabilities[C]//IEEE Symposium on Security and Privacy.New York:IEEE Press,2006:258-263.DOI:10.1109/SP.2006.29.
[10] 潘古兵,周彦晖.基于静态分析和动态检测的 XSS 漏洞发现[J].计算机科学,2012,39(B6):51-53.
[11] BRAVENBOER M,SMARAGDAKIS Y.Strictly declarative specification of sophisticated points-to analyses[J].ACM SIGPLAN Notices,2009,44(10):243-262.DOI:10.1145/1640089.1640108.
[12] 吴世忠,郭涛,董国伟,等.软件漏洞分析技术[M].北京:科学出版社,2014:79-115.
[13] KILDALL G A.A unified approach to global program optimization[C]//Proceedings of the 1st Annual ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages.New York:ACM,1973:194-206.DOI:10.1145/512927.512945.
[14] 林姗,郑朝霞.基于格的数据流分析研究与应用[J].武汉理工大学学报(信息与管理工程版),2011,33(6):932-935.DOI:10.3963/j.issn.1007-144X.2011.06.021