메뉴 건너뛰기




Volumn , Issue , 2006, Pages 372-382

The essence of command injection attacks in web applications

Author keywords

Command injection attacks; Grammars; Parsing; Runtime verification; Web applications

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; CONTEXT FREE GRAMMARS; HTML; INFORMATION RETRIEVAL; QUERY LANGUAGES; WORLD WIDE WEB;

EID: 33745811685     PISSN: 07308566     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1111037.1111070     Document Type: Conference Paper
Times cited : (222)

References (43)
  • 2
    • 0038304275 scopus 로고    scopus 로고
    • An NGSSoftware Insight Security Research (NISR) publication
    • C. Anley. Advanced SQL Injection in SQL Server Applications. An NGSSoftware Insight Security Research (NISR) publication, 2002. URL: http://www.nextgenss.com/papers/advanced_sql_injection.pdf.
    • (2002) Advanced SQL Injection in SQL Server Applications
    • Anley, C.1
  • 8
    • 0034836394 scopus 로고    scopus 로고
    • Intrusion detection via static analysis
    • Oakland, CA, May. IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press
    • D. Dean and D. Wagner. Intrusion detection via static analysis. In Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 2001. IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press.
    • (2001) Proceedings of the IEEE Symposium on Research in Security and Privacy
    • Dean, D.1    Wagner, D.2
  • 9
    • 4644322663 scopus 로고    scopus 로고
    • The Fugue protocol checker: Is your software baroque?
    • Microsoft Research, Jan.
    • R. DeLine and M. Fähndrich. The Fugue protocol checker: Is your software baroque? Technical Report MSR-TR-2004-07, Microsoft Research, Jan. 2004. http://research.microsoft.com/~maf/Papers/tr-2004-07.pdf.
    • (2004) Technical Report , vol.MSR-TR-2004-07
    • DeLine, R.1    Fähndrich, M.2
  • 14
    • 84880450431 scopus 로고    scopus 로고
    • Web application security assessment by fault injection and behavior monitoring
    • Y.-W. Huang, S.-K. Huang, T.-P. Lin, and C.-H. Tsai. Web application security assessment by fault injection and behavior monitoring. In World Wide Web, 2003.
    • (2003) World Wide Web
    • Huang, Y.-W.1    Huang, S.-K.2    Lin, T.-P.3    Tsai, C.-H.4
  • 15
    • 19944365247 scopus 로고    scopus 로고
    • Securing web application code by static analysis and runtime protection
    • Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D.-T. Lee, and S.-Y. Kuo. Securing web application code by static analysis and runtime protection. In World Wide Web, pages 40-52, 2004.
    • (2004) World Wide Web , pp. 40-52
    • Huang, Y.-W.1    Yu, F.2    Hang, C.3    Tsai, C.-H.4    Lee, D.-T.5    Kuo, S.-Y.6
  • 16
    • 84976706502 scopus 로고
    • Global data flow analysis and iterative algorithms
    • J. B. Kam and J. D. Ullman. Global data flow analysis and iterative algorithms. Journal of the ACM, 23(1):158-171, 1976.
    • (1976) Journal of the ACM , vol.23 , Issue.1 , pp. 158-171
    • Kam, J.B.1    Ullman, J.D.2
  • 24
    • 84923564816 scopus 로고    scopus 로고
    • Finding security vulnerabilities in Java applications with static analysis
    • Aug. To appear
    • V. B. Livshits and M. S. Lam. Finding security vulnerabilities in Java applications with static analysis. In Usenix Security Symposium, Aug. 2005. To appear.
    • (2005) Usenix Security Symposium
    • Livshits, V.B.1    Lam, M.S.2
  • 30
    • 26444597311 scopus 로고    scopus 로고
    • Static analysis of role-based access control in J2EE applications
    • G. Naumovich and P. Centonze. Static analysis of role-based access control in J2EE applications. SIGSOFT Software Engineering Notes, 29(5): 1-10, 2004.
    • (2004) SIGSOFT Software Engineering Notes , vol.29 , Issue.5 , pp. 1-10
    • Naumovich, G.1    Centonze, P.2
  • 34
  • 35
    • 77953069969 scopus 로고    scopus 로고
    • Abstracting application-level web security
    • D. Scott and R. Sharp. Abstracting application-level web security. In World Wide Web, 2002.
    • (2002) World Wide Web
    • Scott, D.1    Sharp, R.2
  • 36
    • 0041347756 scopus 로고    scopus 로고
    • Specifying and enforcing application-level web security policies
    • D. Scott and R. Sharp. Specifying and enforcing application-level web security policies. IEEE Transactions on Knowledge and Data Engineering, 15(4):771-783, 2003.
    • (2003) IEEE Transactions on Knowledge and Data Engineering , vol.15 , Issue.4 , pp. 771-783
    • Scott, D.1    Sharp, R.2
  • 37
    • 84858908974 scopus 로고    scopus 로고
    • Security Focus, http://www.securityfocus.com.
  • 38
    • 33745817665 scopus 로고    scopus 로고
    • SPI dynamics
    • Web Application Security Assessment
    • SPI Dynamics. Web Application Security Assessment. SPI Dynamics Whitepaper, 2003.
    • (2003) SPI Dynamics Whitepaper


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.