메뉴 건너뛰기




Volumn , Issue , 2006, Pages 147-156

Insider and ousider threat-sensitive SQL injection vulnerability analysis in PHP

Author keywords

[No Author keywords available]

Indexed keywords

DATABASE SYSTEMS; SECURITY OF DATA; STATIC ANALYSIS;

EID: 34948906804     PISSN: 10951350     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WCRE.2006.33     Document Type: Conference Paper
Times cited : (10)

References (43)
  • 1
    • 34948841923 scopus 로고    scopus 로고
    • JavaCC
    • JavaCC. https://javacc.dev.java.net.
  • 2
    • 34948814546 scopus 로고    scopus 로고
    • National Infrastructure Security Co-ordination Centre
    • National Infrastructure Security Co-ordination Centre. http://www.uniras.gov.uk/niscc/index-en.html.
  • 3
    • 34948860540 scopus 로고    scopus 로고
    • PHP grammar. https://javacc.dev.java.net//files/documents/17/14269/ php.jj.
    • PHP grammar
  • 4
    • 34948897996 scopus 로고    scopus 로고
    • U.S. Department of Energy
    • U.S. Department of Energy. http://www.ciac.org/ciac/CIACHome.htm.
  • 5
    • 34948885075 scopus 로고    scopus 로고
    • mySql. http://dev.mysql.com/doc.
    • mySql1
  • 6
    • 34948853218 scopus 로고    scopus 로고
    • Php. http://www.php.net/manual.
    • Php1
  • 7
    • 34948874184 scopus 로고    scopus 로고
    • phpBB. http://www.phpbb.com.
    • phpBB1
  • 8
    • 34948843512 scopus 로고    scopus 로고
    • phpBB archive. http://www.phpbb.com/phpBB/viewtopic.php?t=113826.
    • phpBB archive. http://www.phpbb.com/phpBB/viewtopic.php?t=113826.
  • 9
    • 34948813545 scopus 로고    scopus 로고
    • phpBB security. http://www.securityfocus.com/bid/7932.
    • phpBB security. http://www.securityfocus.com/bid/7932.
  • 10
    • 34948885596 scopus 로고    scopus 로고
    • XPath. http://www.w3.org/TR/xpath.
    • XPath. http://www.w3.org/TR/xpath.
  • 11
    • 33745653593 scopus 로고    scopus 로고
    • Advanced SQL injection
    • Technical report. NGSSoftware Insight Security Research
    • C. Anley. Advanced SQL injection. In Technical report. NGSSoftware Insight Security Research, 2002.
    • (2002)
    • Anley, C.1
  • 13
    • 34547305805 scopus 로고    scopus 로고
    • A feedback based quality assessment to support open source software evolution: The grass case study
    • IEEE Computer Society Press, to appear
    • S. Bouktif, G. Antoniol, and E. Merlo. A feedback based quality assessment to support open source software evolution: the grass case study. In Proceedings of IEEE International Conference on Software Maintenance. IEEE Computer Society Press, 2006 (to appear).
    • (2006) Proceedings of IEEE International Conference on Software Maintenance
    • Bouktif, S.1    Antoniol, G.2    Merlo, E.3
  • 14
    • 35048851186 scopus 로고    scopus 로고
    • SQLrand: Preventing SQL injection attacks
    • Proc. of the 2nd Applied Cryptography and Network Security (ACNS) Conference, Springer-Verlag
    • S. W. Boyd and A. D. Keromytis. SQLrand: Preventing SQL injection attacks. In Proc. of the 2nd Applied Cryptography and Network Security (ACNS) Conference, volume 3089, pages 292-304. Lecture Notes in Computer Science, Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3089 , pp. 292-304
    • Boyd, S.W.1    Keromytis, A.D.2
  • 18
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 22
    • 34250357872 scopus 로고    scopus 로고
    • Information flow control for java based on path conditions in dependence graphs
    • IEEE Computer Society Press, March
    • C. Hammer, J. Kririke, and G. Snelting. Information flow control for java based on path conditions in dependence graphs. In International Symposium on Secure Software Engineering (ISSSE), pages 87-96. IEEE Computer Society Press, March 2006.
    • (2006) International Symposium on Secure Software Engineering (ISSSE) , pp. 87-96
    • Hammer, C.1    Kririke, J.2    Snelting, G.3
  • 27
    • 27844543023 scopus 로고    scopus 로고
    • Insider threat study: Computer system sabotage in critical infrastructure sectors
    • Technical report, United States Secret Service and CERT Coordination Center/SEI, May
    • M. Keeney, D. Cappelli, E. Kowalski, A. Moore, T. Shimeall, and S. Rogers. Insider threat study: Computer system sabotage in critical infrastructure sectors. Technical report, United States Secret Service and CERT Coordination Center/SEI, May 2005.
    • (2005)
    • Keeney, M.1    Cappelli, D.2    Kowalski, E.3    Moore, A.4    Shimeall, T.5    Rogers, S.6
  • 28
    • 35248842644 scopus 로고    scopus 로고
    • Scaling Java points-to analysis using Spark
    • G. Hedin, editor, Compiler Construction, 12th International Conference, of, Warsaw, Poland, April, Springer-Verlag
    • O. Lhoták and L. Hendren. Scaling Java points-to analysis using Spark. In G. Hedin, editor, Compiler Construction, 12th International Conference, volume 2622 of LNCS, pages 153-169, Warsaw, Poland, April 2003. Springer-Verlag.
    • (2003) LNCS , vol.2622 , pp. 153-169
    • Lhoták, O.1    Hendren, L.2
  • 31
    • 34948846077 scopus 로고    scopus 로고
    • Insider threat resistant SQL-injection prevention in PHP
    • Technical Report EPM-RT-2006-04, Ecole Polytechnique de Montreal, April
    • E. Merlo, D. Letarte, and G. Antoniol. Insider threat resistant SQL-injection prevention in PHP. Technical Report EPM-RT-2006-04, Ecole Polytechnique de Montreal, http://www.polymtl.ca/biblio, April 2006.
    • (2006)
    • Merlo, E.1    Letarte, D.2    Antoniol, G.3
  • 37
    • 32644465248 scopus 로고    scopus 로고
    • Insider threat study: Illicit cyber activity in the banking and finance sector
    • Technical report, United States Secret Service and CERT Coordination Center/SEI, August
    • M. R. Randazzo, D. Cappelli, M. Keeney, A. Moore, and E. Kowalski. Insider threat study: Illicit cyber activity in the banking and finance sector. Technical report, United States Secret Service and CERT Coordination Center/SEI, August 2004.
    • (2004)
    • Randazzo, M.R.1    Cappelli, D.2    Keeney, M.3    Moore, A.4    Kowalski, E.5
  • 38
    • 0032295876 scopus 로고    scopus 로고
    • Program analysis via graph reachability
    • T. Reps. Program analysis via graph reachability. Information and Software Technology, 40(11-12):701-726, 1998.
    • (1998) Information and Software Technology , vol.40 , Issue.11-12 , pp. 701-726
    • Reps, T.1
  • 40
    • 0000990322 scopus 로고
    • A survey of program slicing techniques
    • R Tip. A survey of program slicing techniques. Journal of Programming Languages, 3(3):121-189, 1995.
    • (1995) Journal of Programming Languages , vol.3 , Issue.3 , pp. 121-189
    • Tip, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.