Search-based security testing of web applications J Thome, A Gorla, A Zeller Proceedings of the 7th International workshop on search-based software …, 2014 | 43 | 2014 |
Search-driven string constraint solving for vulnerability detection J Thome, LK Shar, D Bianculli, L Briand 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE …, 2017 | 38 | 2017 |
Security slicing for auditing common injection vulnerabilities J Thome, LK Shar, D Bianculli, L Briand Journal of Systems and Software 137, 766-783, 2018 | 37 | 2018 |
An integrated approach for effective injection vulnerability analysis of web applications through security slicing and hybrid constraint solving J Thome, LK Shar, D Bianculli, L Briand IEEE Transactions on Software Engineering 46 (2), 163-195, 2018 | 34 | 2018 |
Security Slicing for Auditing XML, XPath, and SQL Injection Vulnerabilities J Thome, LK Shar, L Briand 26th IEEE International Symposium on Software Reliability Engineering, 2015 | 26 | 2015 |
Joanaudit: A tool for auditing common injection vulnerabilities J Thome, LK Shar, D Bianculli, LC Briand Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017 | 13 | 2017 |
A Scalable and Accurate Hybrid Vulnerability Analysis Framework J Thome Doctoral Symposium co-located with 26th IEEE International Symposium on …, 2015 | 4 | 2015 |
SourceWarp: A scalable, SCM-driven testing and benchmarking approach to support data-driven and agile decision making for CI/CD tools and DevOps platforms J Thome, J Johnson, I Dawson, D Bolkensteyn, M Henriksen, M Art 4th ACM/IEEE International Conference on Automation of Software Test (AST 2023), 2023 | | 2023 |
Vulnerability Tracing Using Scope and Offset J Johnson, J Thome, L Charles US Patent App. 17/941,935, 2023 | | 2023 |