-
1
-
-
84858103454
-
-
JavaCC
-
JavaCC. https://javacc.dev.java.net.
-
-
-
-
2
-
-
34948860540
-
-
PHP grammar. https://javacc.dev.java.net//files/documents/17/14269/ php.jj.
-
PHP grammar
-
-
-
3
-
-
84858091137
-
-
mySql. http://dev.mysql.com/doc.
-
-
-
mySql1
-
4
-
-
84858091139
-
-
phpBB. http://www.phpbb.com.
-
-
-
phpBB1
-
5
-
-
84858088420
-
-
SQL
-
SQL. http://www.iso.org.
-
-
-
-
6
-
-
34547717262
-
-
XPath. http://www.w3.org/TR/xpath.
-
XPath. http://www.w3.org/TR/xpath.
-
-
-
-
7
-
-
33745653593
-
Advanced SQL injection
-
Technical report. NGSSoftware Insight Security Research
-
C. Anley. Advanced SQL injection. In Technical report. NGSSoftware Insight Security Research, 2002.
-
(2002)
-
-
Anley, C.1
-
8
-
-
0038304275
-
Advanced SQL injection in SQL server applications
-
Technical report
-
C. Anley. Advanced SQL injection in SQL server applications. In Technical report, 2002.
-
(2002)
-
-
Anley, C.1
-
9
-
-
35048851186
-
SQLrand: Preventing SQL injection attacks
-
Proc. of the 2nd Applied Cryptography and Network Security (ACNS) Conference, Springer-Verlag
-
S. W. Boyd and A. D. Keromytis. SQLrand: Preventing SQL injection attacks. In Proc. of the 2nd Applied Cryptography and Network Security (ACNS) Conference, volume 3089, pages 292-304. Lecture Notes in Computer Science, Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3089
, pp. 292-304
-
-
Boyd, S.W.1
Keromytis, A.D.2
-
11
-
-
35248891044
-
Precise analysis of string expressions
-
Springer-Verlag, June
-
A. S. Christensen, A. Moller, and M. I. Schwartzbach. Precise analysis of string expressions. In Proc. of the 10th International Static Analysis Symposium, SAS, pages 1-18. Springer-Verlag, June 2003.
-
(2003)
Proc. of the 10th International Static Analysis Symposium, SAS
, pp. 1-18
-
-
Christensen, A.S.1
Moller, A.2
Schwartzbach, M.I.3
-
14
-
-
77952407110
-
AMNESIA: Analysis and Monitoring for NEutralizing SQL-Injection Attacks
-
Association for Computing Machinery ACM, Nov
-
W. G. J. Halfond and A. Orso. AMNESIA: Analysis and Monitoring for NEutralizing SQL-Injection Attacks. In Automated Software Engineering (ASE). Association for Computing Machinery (ACM), Nov 2005.
-
(2005)
Automated Software Engineering (ASE)
-
-
Halfond, W.G.J.1
Orso, A.2
-
17
-
-
19944365247
-
Securing web application code by static analysis and runtime protection
-
May
-
Y.-W. Huang, F. Yu, C. Hang, C-H. Tsai, D. T. Lee, and S.-Y. Kuo. Securing web application code by static analysis and runtime protection. In Proc. of the 12th International World Wide Web Conference (WWW), May 2004.
-
(2004)
Proc. of the 12th International World Wide Web Conference (WWW)
-
-
Huang, Y.-W.1
Yu, F.2
Hang, C.3
Tsai, C.-H.4
Lee, D.T.5
Kuo, S.-Y.6
-
20
-
-
33745658114
-
Second-order code injection attacks
-
Technical report. NGSSoftware Insight Security Research
-
G. Ollmann. Second-order code injection attacks. In Technical report. NGSSoftware Insight Security Research, 2004.
-
(2004)
-
-
Ollmann, G.1
|