A Taxonomy of SQL Injection Detection and Prevention Techniques
暂无分享,去创建一个
[1] Angelos D. Keromytis,et al. SQLrand: Preventing SQL Injection Attacks , 2004, ACNS.
[2] Xiang Fu,et al. A String Constraint Solver for Detecting Web Application Vulnerability , 2010, SEKE.
[3] R.A. McClure,et al. SQL DOM: compile time checking of dynamic SQL statements , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..
[4] V. N. Venkatakrishnan,et al. CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks , 2010, TSEC.
[5] Lwin Khin Shar,et al. Defeating SQL Injection , 2013, Computer.
[6] Lwin Khin Shar,et al. Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities , 2012, 2012 34th International Conference on Software Engineering (ICSE).
[7] Alessandro Orso,et al. AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks , 2005, ASE.
[8] Laurie Williams,et al. SQLUnitGen: SQL Injection Testing Using Static and Dynamic Analysis , 2006 .
[9] Mohammad Zulkernine,et al. MUSIC: Mutation-based SQL Injection Vulnerability Checking , 2008, 2008 The Eighth International Conference on Quality Software.
[10] Alessandro Orso,et al. WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation , 2008, IEEE Transactions on Software Engineering.
[11] Angelos Stavrou,et al. SQLProb: a proxy-based architecture towards preventing SQL injection attacks , 2009, SAC '09.
[12] Michael D. Ernst,et al. Automatic creation of SQL Injection and cross-site scripting attacks , 2009, 2009 IEEE 31st International Conference on Software Engineering.
[13] Zhendong Su,et al. Sound and precise analysis of web applications for injection vulnerabilities , 2007, PLDI '07.
[14] Etienne Janot,et al. Preventing SQL Injections in Online Applications : Study , Recommendations and Java Solution Prototype Based on the SQL DOM , 2008 .
[15] Marco Vieira,et al. Vulnerability & attack injection for web applications , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.
[16] Marco Vieira,et al. Defending against Web Application Vulnerabilities , 2012, Computer.