-
1
-
-
0038304275
-
Advanced SQL injection in SQL server applications
-
NGSSoftware Insight Security Research
-
Anley, C.: Advanced SQL Injection In SQL Server Applications. Technical report, NGSSoftware Insight Security Research (2002).
-
(2002)
Technical Report
-
-
Anley, C.1
-
2
-
-
33745653593
-
Advanced SQL injection
-
(more), NGSSoftware Insight Security Research
-
Anley, C.: (more) Advanced SQL Injection. Technical report, NGSSoftware Insight Security Research (2002).
-
(2002)
Technical Report
-
-
Anley, C.1
-
3
-
-
35048851186
-
SQLrand: Preventing SQL injection attacks
-
Jakobsson, M., Yung, M., Zhou, J., eds.: Proceedings of the 2nd Applied Cryptography and Network Security (ACNS) Conference. Springer-Verlag
-
Boyd, S., Keromytis, A.: SQLrand: Preventing SQL injection attacks. In Jakobsson, M., Yung, M., Zhou, J., eds.: Proceedings of the 2nd Applied Cryptography and Network Security (ACNS) Conference. Volume 3089 of Lecture Notes in Computer Science., Springer-Verlag (2004) 292-304.
-
(2004)
Lecture Notes in Computer Science
, vol.3089
, pp. 292-304
-
-
Boyd, S.1
Keromytis, A.2
-
5
-
-
35248828504
-
Aspect-oriented programming
-
Aksjt, M., Matsuoka, S., eds.: Proceedings European Conference on Object-Oriented Programming. Springer-Verlag
-
Kiczales, G., Lamping, J., Menhdhekar, A., Maeda, C., Lopes, C., Loingtier, J.M., Irwin, J.: Aspect-Oriented Programming. In Aksjt, M., Matsuoka, S., eds.: Proceedings European Conference on Object-Oriented Programming. Volume 1241 of Lecture Notes in Computer Science., Springer-Verlag (1997) 220-242.
-
(1997)
Lecture Notes in Computer Science
, vol.1241
, pp. 220-242
-
-
Kiczales, G.1
Lamping, J.2
Menhdhekar, A.3
Maeda, C.4
Lopes, C.5
Loingtier, J.M.6
Irwin, J.7
-
6
-
-
85077733517
-
High coverage detection of input-related security faults
-
Washington D.C., USENIX
-
Larson, E., Austin, T.: High coverage detection of input-related security faults. In: Proceedings of the 12th USENIX Security Symposium, Washington D.C., USENIX (2003) 121-136.
-
(2003)
Proceedings of the 12th USENIX Security Symposium
, pp. 121-136
-
-
Larson, E.1
Austin, T.2
-
8
-
-
33745635923
-
SQL injection signatures evasion
-
Irnperva Application Defense Center
-
Maor, O., Shulman, A.: SQL Injection Signatures Evasion. Technical report, Irnperva Application Defense Center (2004).
-
(2004)
Technical Report
-
-
Maor, O.1
Shulman, A.2
-
9
-
-
2942734936
-
Unifying tables, objects and documents
-
Uppsala, Sweeden
-
Meijer, E., Schulte, W., Bierman, G.: Unifying tables, objects and documents. In: Workshop on Declarative Programming in the Context of OO Languages (DP-COOL'03), Uppsala, Sweeden (2003) 145-166.
-
(2003)
Workshop on Declarative Programming in the Context of OO Languages (DP-COOL'03)
, pp. 145-166
-
-
Meijer, E.1
Schulte, W.2
Bierman, G.3
-
11
-
-
27644589395
-
-
NIST: ICAT Metabase. Web page at http://icat.nist.gov/ (2000-2004).
-
(2000)
ICAT Metabase
-
-
-
12
-
-
3042546730
-
HTML code injection and cross-site scripting
-
Gunter Ollmann
-
Ollmann, G.: HTML Code Injection and Cross-site Scripting. Technical report, Gunter Ollmann (2002).
-
(2002)
Technical Report
-
-
Ollmann, G.1
-
13
-
-
33745658114
-
Second-order code injection attacks
-
NGSSoftware Insight Security Research
-
Ollmann, G.: Second-order Code Injection Attacks. Technical report, NGSSoftware Insight Security Research (2004).
-
(2004)
Technical Report
-
-
Ollmann, G.1
-
14
-
-
0004185881
-
-
PHP Group, T.: PHP Hypertext Preprocessor. Web page at http://www.php.net (2001-2004).
-
(2001)
PHP Hypertext Preprocessor
-
-
-
15
-
-
33745669153
-
-
phpBB Group, T.: phpBB.com. Web page at http://www.phpbb.com (2001-2004).
-
(2001)
-
-
-
16
-
-
33745674093
-
-
SecurityFocus: BugTraq. Web page at http://www.securityfocus.com/bid (1998-2004).
-
(1998)
BugTraq
-
-
-
17
-
-
85084164620
-
Detecting format string vulnerabilities with type qualifiers
-
Washington D.C., USENIX
-
Shankar, U., Talwar, K., Poster, J.S., Wagner, D.: Detecting format string vulnerabilities with type qualifiers. In: Proceedings of the 10th USENIX Security Symposium, Washington D.C., USENIX (2001) 257-272.
-
(2001)
Proceedings of the 10th USENIX Security Symposium
, pp. 257-272
-
-
Shankar, U.1
Talwar, K.2
Poster, J.S.3
Wagner, D.4
|