[1] L. D. P. Nico, “Authomated Security Review of
PHP Web Applications with Source Code Analysis,”
Thesis, University of Groningen, pp. 14-14,
2010.
[2] C. Korscheck, “Automatic Detection of Second-
Order Cross-Site Scripting Vulnerabilities,” Thesis,
University of Tubingen, pp. 2-4, 2010.
[3] J. Nenad, K. Christopher, and K. Engin, “Static
analysis for detecting taint-style vulnerabilities in
web applications,” Journal of Computer Security,
vol. 18, no. 5, 2010.
[4] L. Benjamin and S. L. Monica, “Finding Security
Vulnerabilities in Java Applications with Static
Analysis,” in USENIX Security Symposium, vol.
14, pp. 18-18, 2005.
[5] N. Anh, G. Salvatore, G. Doug, Sh. Jeff, and E.
David, “Authomatically hardening web applications
using precise tainting,” Security and Privacy
in the Age of Ubiquitous Computing, Springer
US, pp. 295-307, 2005.
[6] H. Vivek, Ch. Deepak, and F. Michael, “Dynamic
taint propagation for java,” in Annual Computer
Security Applications Conference, vol. 21, pp. 303
-311, 2005.
[7] K. Adam, J. G. Philip, J. Karthick, and D. E. Michael,
“Authomatic Creation of SQL Injection and
Cross-Site Scripting Attacks,” in International
Conference on Software Engineering, vol. 31, pp.
199-209, 2009.
[8] G. H. William, O. Alessandro, “AMNESIA: Analysis
and Monitoring for NEutralizing SQLInjection
Attacks,” in IEEE/ACM International
Conference on Authomated Software Engineering,
vol. 20, pp. 174-183, 2005.
[9] “RIPS-A static source code analyser for vulnerabilities
in PHP scripts,” http://ripsscanner.
sourceforge.net/ 2011.
[10] “phc – the open source PHP compiler,” [Online],
Version 3.0.1, http://www.phpcompiler.org/July
2013.
[11] “OWASP Top Ten Project,” [Online],
https://www.owasp.org/index.php/
Category:OWASP_Top_Ten_Project/June 2013.
[12] M. Ghorbanzadeh and M. R. Shahriari, “Static
detection of web applications vulnerabilities using
inverse data flow analysis for covering mejority of
sensitive points to vulnerability,” In international
ISC conferenec 9, Tehran, 1391. (In persian)