• Tidak ada hasil yang ditemukan

Pendeteksian Celah Keamanan SSL TLS Menggunakan Android

N/A
N/A
Protected

Academic year: 2017

Membagikan "Pendeteksian Celah Keamanan SSL TLS Menggunakan Android"

Copied!
3
0
0

Teks penuh

(1)

62

DAFTAR PUSTAKA

Akrout, R., Alata, E., Kaaniche, M. & Nicomette, V. 2014. An Automated Black Box Approach for Web Vulnerability Identification and Attack Scenario Generation.

Journal of the Brazilian Computer Society 2014, 20:4.

Sandulescu , Mihai .2014. Techniques for Finding Vulnerabilities in Web Applications . Journal of Mobile, Embedded and Distributed Systems Vol. VI, no. 1, 2014, 20674074.

Bau ,J., Elie , Gupta ,D. & Mitchell, J. 2010 . State of the Art: Automated Black-Box Web Application Vulnerability Testing. IEEE Symposium on security and privacy, pp.332-345.

Gujrathi, S .2014. Heartbleed Bug: AnOpenSSL Heartbeat Vulnerability.

International Journal of Computer Science and Engineering Vol. 2(5), 2014, 2347-269.

CVE-2014-0160 .2014. The Heartbleed Bug, http://heartbleed.com/ (diakses 13 maret 2015).

Irianto, Nugraha .2011. Implementasi Google Hack For Penetration Testing Sebagai Addons Google Chrome .Skripsi. Universitas Pembangunan Nasional.

Zhang, V .2014. Heartbleed Bug—Mobile Apps are Affected Too,

http://blog.trendmicro .com/trendlabs-security-intelligence/heartbleed-bug-mobile-apps-are-affected-too/ (diakses 17 maret 2015).

Durumeric, Z et al .2014. Heartbleed Bug Health Report, https://zmap.io/heartbleed/

(diakses 13 maret 2015).

APJII .2015. Pengguna internet indonesia tahun 2014 sebanyak 88,1 juta (34,9%),

http://www.apjii.or.id/v2/read/content/info-terkini/301/pengguna-internet-indonesia-tahun-2014-sebanyak-88.html/ (diakses 1 april 2015).

US-CERT .2014. “Heartbleed” OpenSSL Vulnerability. https://www.us-cert.gov/sites/

default/files/publications/Heartbleed%20OpenSSL%20Vulnerability_0.pdf (diakses 13 maret 2015).

Sarno, R. &Iffano, I. 2009.Keamanan Sistem Informasi. ITS press.

Netcraft .2014. Half a million widely trusted websites vulnerable to Heartbleed bug.

http://news.netcraft.com/archives/2014/04/08/half-a-million-widely-trusted-websites-vulnerable-to-heartbleed-bug.html(Diakses 13 maret 2015)

(2)

63

Herrmann, S.D. 2002. A Pratical Guide to Security Engineering And Information Assurance. New York:Auerbach Publications.

Garfinkel, S. & Howard, S.E. 2001.Web Security & Commerce. United States:O'Reilly& Associates.

Chan, Y.B., Yoke,C.A., &Yousefi, D.2013.An Exploratory of Airline E-ticker Purchasing Intenttion among Foreign Undergraduates in Malaysia. Journal of Human and Social Science Research Vol. 1, No. 1 (2013), 51-61.

Stuttard, D., Pinto, M. 2011. The Web Application Hacker's Handbook: Finding And Exploiting Security Fla ws. 2 ndEdition. Canada: John Wiley & Sons, Inc.

Pressman, R.S. (2010), Software Engineering : a practitioner‟s approach, McGraw -Hill, New York, 68.

Wiesand S .2014. The Heartbleed Vulnerability in OpenSSL . Technical Seminar Zeuthen

Hess R . 2014. NASA IV&V and the Heartbleed Vulnerability. NASA IV&V International Workshop 2014

Suhina, V., Gros, S. &Kalafatic, Z. 2008.Detecting vulnerabilities in Web applications by clustering Web pages.31st International Convention MIPRO 2008, Vol. V: Digital Economy

McKinley, H.L. 2015. SSL and TLS: A Beginners Guide. SANS Institute

Digicert .2015. What Is SSL (Secure Sockets Layer) and What Are SSL Certificates?,

https://www.digicert.com/ssl.htm (diakses 13 maret 2015).

Tutorials point .2015. What is a detection-scripts (diakses 31 januari 2016)

OWASP .2014. OWASP Mobile Security P roject .

https://www.owasp.org/index.php/OWASP_Mobile_Security_P roject#Top_Ten_ Mobile_Risks (diakses 13 desember 2016 )

(3)

64

Ableson, W.F., Sen, R., King, C., & Ortiz,C.E .Android in Action. 3 rdEdition. Shelter Island:New York

Westpoint .2014. Understanding the Heartbleed Proof of Concept .

http://www.westpoint.ltd.uk/blog/2014/04/14/understanding-the-heartbleed-proof-of-concept/ (diakses 3 juni 2015 )

Referensi

Dokumen terkait

The writer use library research for translation methodology and for the theoretical review of translation there are consist of the definition translation, technique of

The work of the historians of the education of women and of people of color is only part of a rich set of recent monographs and articles in the social, political, and intel-

Pejabat adalah pejabat yang berwenang mengangkat dan memberhentikan Juru sita Pajak, menerbitkan Surat Perintah Penagihan Seketika dan Sekaligus, Surat Paksa, Surat

Pada tahap ini dilakukan proses pengolahan data-data yang telah diperoleh. terhadap kapasitas jalan lama, baik itu kapasitas volume

Peraturan Pemerintah Nomor 37 Tahun 2005 tentang Perubahan atas Peraturan Pemerintah Nomor 24 tahun 2004 tentang Kedudukan Protokoler dan Keuangan Pimpinan dan

Dengan adanya aplikasi ini diharapkan dapat diterima oleh berbagai pihak dan digunakan di berbagai vendor TI dikarenakan protokol ini memanfaatkan berbagai teknologi yang sudah

bahwa dalam rangka meningkatkan pelayanan pada masyarakat dibidang penyedotan kakus dan perkembangan yang terjadi ditengah-tengah masyarakat serta untuk membedakan tarif

Pada Penulisan Ilmiah ini, Penulis membahas tentang bagaimana cara membuat Game Goes to Campus Pada jaringan LAN dengan J2SE(Java2 Standart Edition), digunakannya bahasa Java,