62
DAFTAR PUSTAKA
Akrout, R., Alata, E., Kaaniche, M. & Nicomette, V. 2014. An Automated Black Box Approach for Web Vulnerability Identification and Attack Scenario Generation.
Journal of the Brazilian Computer Society 2014, 20:4.
Sandulescu , Mihai .2014. Techniques for Finding Vulnerabilities in Web Applications . Journal of Mobile, Embedded and Distributed Systems Vol. VI, no. 1, 2014, 2067–4074.
Bau ,J., Elie , Gupta ,D. & Mitchell, J. 2010 . State of the Art: Automated Black-Box Web Application Vulnerability Testing. IEEE Symposium on security and privacy, pp.332-345.
Gujrathi, S .2014. Heartbleed Bug: AnOpenSSL Heartbeat Vulnerability.
International Journal of Computer Science and Engineering Vol. 2(5), 2014, 2347-269.
CVE-2014-0160 .2014. The Heartbleed Bug, http://heartbleed.com/ (diakses 13 maret 2015).
Irianto, Nugraha .2011. Implementasi Google Hack For Penetration Testing Sebagai Addons Google Chrome .Skripsi. Universitas Pembangunan Nasional.
Zhang, V .2014. Heartbleed Bug—Mobile Apps are Affected Too,
http://blog.trendmicro .com/trendlabs-security-intelligence/heartbleed-bug-mobile-apps-are-affected-too/ (diakses 17 maret 2015).
Durumeric, Z et al .2014. Heartbleed Bug Health Report, https://zmap.io/heartbleed/
(diakses 13 maret 2015).
APJII .2015. Pengguna internet indonesia tahun 2014 sebanyak 88,1 juta (34,9%),
http://www.apjii.or.id/v2/read/content/info-terkini/301/pengguna-internet-indonesia-tahun-2014-sebanyak-88.html/ (diakses 1 april 2015).
US-CERT .2014. “Heartbleed” OpenSSL Vulnerability. https://www.us-cert.gov/sites/
default/files/publications/Heartbleed%20OpenSSL%20Vulnerability_0.pdf (diakses 13 maret 2015).
Sarno, R. &Iffano, I. 2009.Keamanan Sistem Informasi. ITS press.
Netcraft .2014. Half a million widely trusted websites vulnerable to Heartbleed bug.
http://news.netcraft.com/archives/2014/04/08/half-a-million-widely-trusted-websites-vulnerable-to-heartbleed-bug.html(Diakses 13 maret 2015)
63
Herrmann, S.D. 2002. A Pratical Guide to Security Engineering And Information Assurance. New York:Auerbach Publications.
Garfinkel, S. & Howard, S.E. 2001.Web Security & Commerce. United States:O'Reilly& Associates.
Chan, Y.B., Yoke,C.A., &Yousefi, D.2013.An Exploratory of Airline E-ticker Purchasing Intenttion among Foreign Undergraduates in Malaysia. Journal of Human and Social Science Research Vol. 1, No. 1 (2013), 51-61.
Stuttard, D., Pinto, M. 2011. The Web Application Hacker's Handbook: Finding And Exploiting Security Fla ws. 2 ndEdition. Canada: John Wiley & Sons, Inc.
Pressman, R.S. (2010), Software Engineering : a practitioner‟s approach, McGraw -Hill, New York, 68.
Wiesand S .2014. The Heartbleed Vulnerability in OpenSSL . Technical Seminar Zeuthen
Hess R . 2014. NASA IV&V and the Heartbleed Vulnerability. NASA IV&V International Workshop 2014
Suhina, V., Gros, S. &Kalafatic, Z. 2008.Detecting vulnerabilities in Web applications by clustering Web pages.31st International Convention MIPRO 2008, Vol. V: Digital Economy
McKinley, H.L. 2015. SSL and TLS: A Beginners Guide. SANS Institute
Digicert .2015. What Is SSL (Secure Sockets Layer) and What Are SSL Certificates?,
https://www.digicert.com/ssl.htm (diakses 13 maret 2015).
Tutorials point .2015. What is a detection-scripts (diakses 31 januari 2016)
OWASP .2014. OWASP Mobile Security P roject .
https://www.owasp.org/index.php/OWASP_Mobile_Security_P roject#Top_Ten_ Mobile_Risks (diakses 13 desember 2016 )
64
Ableson, W.F., Sen, R., King, C., & Ortiz,C.E .Android in Action. 3 rdEdition. Shelter Island:New York
Westpoint .2014. Understanding the Heartbleed Proof of Concept .
http://www.westpoint.ltd.uk/blog/2014/04/14/understanding-the-heartbleed-proof-of-concept/ (diakses 3 juni 2015 )