THOME, J., SHAR, L. K., BIANCULLI, D., & BRIAND, L. (February 2020). An Integrated Approach for Effective Injection Vulnerability Analysis of Web Applications through Security Slicing and Hybrid Constraint Solving. IEEE Transactions on Software Engineering, 46 (2), 163--195. doi:10.1109/TSE.2018.2844343 Peer reviewed |
THOME, J. (2018). A Scalable and Accurate Hybrid Vulnerability Analysis Framework [Doctoral thesis, Unilu - University of Luxembourg]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/35504 |
THOME, J., SHAR, L. K., BIANCULLI, D., & BRIAND, L. (2018). Security Slicing for Auditing Common Injection Vulnerabilities. Journal of Systems and Software, 137 (March, 2018), 766-783. doi:10.1016/j.jss.2017.02.040 Peer Reviewed verified by ORBi |
THOME, J., SHAR, L. K., BIANCULLI, D., & BRIAND, L. (2017). JoanAudit: A Tool for Auditing Common Injection Vulnerabilities. In 11th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering. ACM. doi:10.1145/3106237.3122822 Peer reviewed |
THOME, J., SHAR, L. K., BIANCULLI, D., & BRIAND, L. (2017). Search-driven String Constraint Solving for Vulnerability Detection. In Proceedings of the 39th International Conference on Software Engineering (ICSE 2017). ACM. doi:10.1109/ICSE.2017.26 Peer reviewed |
THOME, J. (2015). A Scalable and Accurate Hybrid Vulnerability Analysis Framework. In Doctoral Symposium co-located with 26th IEEE International Symposium on Software Reliability Engineering (2015). Peer reviewed |
THOME, J., SHAR, L. K., & BRIAND, L. (2015). Security Slicing for Auditing XML, XPath, and SQL Injection Vulnerabilities. In 26th IEEE International Symposium on Software Reliability Engineering. IEEE. doi:10.1109/ISSRE.2015.7381847 Peer reviewed |
THOME, J., Gorla, A., & Zeller, A. (2014). Search-based Security Testing of Web Applications. In SBST 2014 Proceedings of the 7th International Workshop on Search-Based Software Testing (pp. 5--14). New York, NY, USA, Unknown/unspecified: ACM. doi:10.1145/2593833.2593835 Peer reviewed |