Intrusion Protection against SQL Injection Attacks Using a Reverse Proxy
暂无分享,去创建一个
[1] Laurie Ann Williams,et al. Towards a taxonomy of techniques to detect cross-site scripting and SQL injection vulnerabilities , 2008 .
[2] Alessandro Orso,et al. AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks , 2005, ASE.
[3] Richard Sharp,et al. Abstracting application-level web security , 2002, WWW.
[4] Zhendong Su,et al. The essence of command injection attacks in web applications , 2006, POPL '06.
[5] Bruce W. Weide,et al. Using parse tree validation to prevent SQL injection attacks , 2005, SEM '05.
[6] J. William Ahwood,et al. CLASSIFICATION , 1931, Foundations of Familiar Language.
[7] Chris Anley,et al. Advanced SQL Injection In SQL Server Applications , 2002 .
[8] Angelos D. Keromytis,et al. SQLrand: Preventing SQL Injection Attacks , 2004, ACNS.
[9] Premkumar T. Devanbu,et al. JDBC checker: a static analysis tool for SQL/JDBC applications , 2004, Proceedings. 26th International Conference on Software Engineering.
[10] Shih-Kun Huang,et al. Web application security assessment by fault injection and behavior monitoring , 2003, WWW '03.
[11] Laurie A. Williams,et al. Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks , 2010, ESSoS.
[12] Stephen Kost. An Introduction to SQL Injection Attacks for Oracle Developers , 2007 .
[13] D. T. Lee,et al. Securing web application code by static analysis and runtime protection , 2004, WWW '04.
[14] Konstantinos Kemalis,et al. SQL-IDS: a specification-based approach for SQL-injection detection , 2008, SAC '08.