Analysis of SQL Injections Attacks and Vulnerabilities
暂无分享,去创建一个
[1] Alessandro Orso,et al. WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation , 2008, IEEE Transactions on Software Engineering.
[2] Alfred Basta,et al. Computer Security and Penetration Testing , 2007 .
[3] Zhou Guo-xiang. SQL Injection Attacks in Web Application , 2010 .
[4] Alessandro Orso,et al. AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks , 2005, ASE.
[5] Jin-Cherng Lin,et al. The Automatic Defense Mechanism for Malicious Injection Attack , 2007, 7th IEEE International Conference on Computer and Information Technology (CIT 2007).
[6] Angelos D. Keromytis,et al. SQLrand: Preventing SQL Injection Attacks , 2004, ACNS.
[7] Sang-Soo Yeo,et al. A novel method for SQL injection attack detection based on removing SQL query attribute values , 2012, Math. Comput. Model..
[8] Abhishek Kumar Baranwal. Approaches to detect SQL injection and XSS in web applications , 2012 .
[9] Zhendong Su,et al. The essence of command injection attacks in web applications , 2006, POPL '06.
[10] Deevi Radha Rani,et al. Web Security by Preventing SQL Injection Using Encryption in Stored Procedures , 2012 .
[11] Zeinab Raveshi,et al. Investigation and Analysis of SQL Injection Attacks on Web Applications: Survey , 2013 .
[12] Michael D. Ernst,et al. Automatic creation of SQL Injection and cross-site scripting attacks , 2009, 2009 IEEE 31st International Conference on Software Engineering.
[13] S. Panda,et al. Protection of Web Application against Sql Injection Attacks , 2013 .
[14] Mei Junjin,et al. An Approach for SQL Injection Vulnerability Detection , 2009, 2009 Sixth International Conference on Information Technology: New Generations.
[15] Alan Newson. Scanners: Network threats and vulnerability scanners , 2005 .
[16] Konstantinos Kemalis,et al. SQL-IDS: a specification-based approach for SQL-injection detection , 2008, SAC '08.
[17] Craig S. Wright. The IT Regulatory and Standards Compliance Handbook: How to Survive Information Systems Audit and Assessments , 2008 .
[18] Paul Midian. How to ensure an effective penetration test , 2003, Inf. Secur. Tech. Rep..
[19] Kanchana Natarajan,et al. Generation of Sql-injection Free Secure Algorithm to Detect and Prevent Sql-Injection Attacks , 2012 .
[20] Xiang Chen,et al. D-WAV: A Web Application Vulnerabilities Detection Tool Using Characteristics of Web Forms , 2010, 2010 Fifth International Conference on Software Engineering Advances.