Code Reuse At­tacks in PHP: Au­to­ma­ted POP Chain Ge­ne­ra­ti­on
Jo­han­nes Dahse, Ni­ko­lai Krein, Thors­ten Holz
21st ACM Con­fe­rence on Com­pu­ter and Com­mu­ni­ca­ti­ons Se­cu­ri­ty (CCS)
Scotts­da­le, Ari­zo­na, USA, No­vem­ber 2014
** Best Student Paper Award **

Sta­tic De­tec­tion of Se­cond-Or­der Vul­nerabi­li­ties in Web Ap­p­li­ca­ti­ons
Jo­han­nes Dahse, Thors­ten Holz
23rd USE­NIX Se­cu­ri­ty Sym­po­si­um
San Diego, CA, USA, Au­gust 2014
** Internet Defense Prize **

Si­mu­la­ti­on of Built-in PHP fea­tures for Pre­cise Sta­tic Code Ana­ly­sis
Jo­han­nes Dahse, Thors­ten Holz
An­nual Net­work & Di­stri­bu­ted Sys­tem Se­cu­ri­ty Sym­po­si­um (NDSS)
San Diego, Fe­bru­ary 2014

Sichere Webanwendungen
Mario Heiderich, Christian Matthies,
Johannes Dahse, fukami
Gebundene Ausgabe: 600 Seiten
Verlag: GALILEO PRESS; Auflage: 1
Sprache: Deutsch
ISBN-10: 3836211947
ISBN-13: 978-3836211949

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: