메뉴 건너뛰기




Volumn , Issue , 2007, Pages 191-200

Automated protection of php applications against SQL-injection attacks

Author keywords

Software re engineering; Software security analysis; SQL injection

Indexed keywords

SOFTWARE REENGINEERING; SOFTWARE SECURITY ANALYSIS; SQL-INJECTION;

EID: 34547655711     PISSN: 15345351     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSMR.2007.16     Document Type: Conference Paper
Times cited : (24)

References (23)
  • 1
    • 84858103454 scopus 로고    scopus 로고
    • JavaCC
    • JavaCC. https://javacc.dev.java.net.
  • 2
    • 34948860540 scopus 로고    scopus 로고
    • PHP grammar. https://javacc.dev.java.net//files/documents/17/14269/ php.jj.
    • PHP grammar
  • 3
    • 84858091137 scopus 로고    scopus 로고
    • mySql. http://dev.mysql.com/doc.
    • mySql1
  • 4
    • 84858091139 scopus 로고    scopus 로고
    • phpBB. http://www.phpbb.com.
    • phpBB1
  • 5
    • 84858088420 scopus 로고    scopus 로고
    • SQL
    • SQL. http://www.iso.org.
  • 6
    • 34547717262 scopus 로고    scopus 로고
    • XPath. http://www.w3.org/TR/xpath.
    • XPath. http://www.w3.org/TR/xpath.
  • 7
    • 33745653593 scopus 로고    scopus 로고
    • Advanced SQL injection
    • Technical report. NGSSoftware Insight Security Research
    • C. Anley. Advanced SQL injection. In Technical report. NGSSoftware Insight Security Research, 2002.
    • (2002)
    • Anley, C.1
  • 8
    • 0038304275 scopus 로고    scopus 로고
    • Advanced SQL injection in SQL server applications
    • Technical report
    • C. Anley. Advanced SQL injection in SQL server applications. In Technical report, 2002.
    • (2002)
    • Anley, C.1
  • 9
    • 35048851186 scopus 로고    scopus 로고
    • SQLrand: Preventing SQL injection attacks
    • Proc. of the 2nd Applied Cryptography and Network Security (ACNS) Conference, Springer-Verlag
    • S. W. Boyd and A. D. Keromytis. SQLrand: Preventing SQL injection attacks. In Proc. of the 2nd Applied Cryptography and Network Security (ACNS) Conference, volume 3089, pages 292-304. Lecture Notes in Computer Science, Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3089 , pp. 292-304
    • Boyd, S.W.1    Keromytis, A.D.2
  • 14
    • 77952407110 scopus 로고    scopus 로고
    • AMNESIA: Analysis and Monitoring for NEutralizing SQL-Injection Attacks
    • Association for Computing Machinery ACM, Nov
    • W. G. J. Halfond and A. Orso. AMNESIA: Analysis and Monitoring for NEutralizing SQL-Injection Attacks. In Automated Software Engineering (ASE). Association for Computing Machinery (ACM), Nov 2005.
    • (2005) Automated Software Engineering (ASE)
    • Halfond, W.G.J.1    Orso, A.2
  • 19
    • 34948906804 scopus 로고    scopus 로고
    • Insider and ousider threat-sensitive SQL injection vulnerability analysis in PHP
    • IEEE Computer Society Press, to appear
    • E. Merlo, D. Letarte, and G. Antoniol. Insider and ousider threat-sensitive SQL injection vulnerability analysis in PHP. In Proceedings of IEEE Working Conference on Reverse Engineering. IEEE Computer Society Press, 2006 (to appear).
    • (2006) Proceedings of IEEE Working Conference on Reverse Engineering
    • Merlo, E.1    Letarte, D.2    Antoniol, G.3
  • 20
    • 33745658114 scopus 로고    scopus 로고
    • Second-order code injection attacks
    • Technical report. NGSSoftware Insight Security Research
    • G. Ollmann. Second-order code injection attacks. In Technical report. NGSSoftware Insight Security Research, 2004.
    • (2004)
    • Ollmann, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.