Intercepting Filter Approach to Injection Flaws
暂无分享,去创建一个
[1] D. T. Lee,et al. Securing web application code by static analysis and runtime protection , 2004, WWW '04.
[2] Alessandro Orso,et al. Combining static analysis and runtime monitoring to counter SQL-injection attacks , 2005 .
[3] Alessandro Orso,et al. AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks , 2005, ASE.
[4] Jesse C. Rabek,et al. Detection of injected, dynamically generated, and obfuscated malicious code , 2003, WORM '03.
[5] George Kurtz,et al. Hacking Exposed: Network Security Secrets & Solutions , 1999 .