4Annual Report by CNCERT/CC [EB/OL]. http://www. cert. org. cn/,2006.
5Sung Whan Woo,Omar H Alhazmi, Yashwant K Malaiy. An Analysis of the Vulnerability Discovery Process in Web Browsers [A]. In Proceedings of the 10 lASTED International Conference Software Engineering and Applications [C]. 2006.
6ulfar Erlingsson, Benjamin Livshits, Yinglian Xie. End - to - End Web Application Security. Proceedings of the 11th Workshop on Hot Topics in Operating Systems (HotOS′07). USENIX Association Berkeley, San Diego,CA, 2007.
7Johns M. SessionSafe.-Implementing XSS Immune Session Handling[A]. Proc. ESORICS[C]. 2006:444 -460.
8Miter. Common Vulnerabilities and Exposures[EB/OL]. http ://cve. mitr. org/cve/, 2007.
9Su Z, Wassermann G. The Essence of Command Injection Attacks in Web Applications[J].Proc. POPL, 2006,4 ( 1 ) : 372 - 382.
10Yu D, Chander A, Islam N, et al. JaveSerip Instrumentation for Browser Security[J]. Proceedings of 34th Annual ACM SIGPLAN- SIGACT Symp. on Principles of Programming Languages[C]. France, 2007 : 237 - 249.