메뉴 건너뛰기




Volumn , Issue , 2007, Pages 3-12

Preventing injection attacks with syntax embeddings

Author keywords

Injection attacks; StringBorg; Syntax embedding

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; COMPUTER SOFTWARE; QUERY LANGUAGES; XML;

EID: 38849180913     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1289971.1289975     Document Type: Conference Paper
Times cited : (38)

References (30)
  • 3
    • 38849118467 scopus 로고    scopus 로고
    • C. Anley. (more) Advanced SQL injection. http://www.ngssoftware.com/ papers/more_advanced_sql_injection.pdf, 2002.
    • C. Anley. (more) Advanced SQL injection. http://www.ngssoftware.com/ papers/more_advanced_sql_injection.pdf, 2002.
  • 4
    • 0031675048 scopus 로고    scopus 로고
    • JTS: Tools for implementing domain-specific languages
    • IEEE Computer Society, June
    • D. Batory, B. Lofaso, and Y. Smaragdakis. JTS: tools for implementing domain-specific languages. In Intl. Conf on Software Reuse (ICSR'98), pages 143-153. IEEE Computer Society, June 1998.
    • (1998) Intl. Conf on Software Reuse (ICSR'98) , pp. 143-153
    • Batory, D.1    Lofaso, B.2    Smaragdakis, Y.3
  • 5
    • 26444619821 scopus 로고    scopus 로고
    • The essence of data access in Cω
    • ECOOP 2005, Object-Oriented Programming, 19th European Conf, of, Springer, July
    • G. Bierman, E. Meijer, and W. Schulte. The essence of data access in Cω. In ECOOP 2005 - Object-Oriented Programming, 19th European Conf., volume 3586 of LNCS, pages 287-311. Springer, July 2005.
    • (2005) LNCS , vol.3586 , pp. 287-311
    • Bierman, G.1    Meijer, E.2    Schulte, W.3
  • 7
    • 33646138011 scopus 로고    scopus 로고
    • Generalized type-based disambiguation of meta programs with concrete object syntax
    • Generative Progmmming and Component Engineering GPCE'05, of, Springer, Sept
    • M. Bravenboer, R. Vermaas, J. Vinju, and E. Visser. Generalized type-based disambiguation of meta programs with concrete object syntax. In Generative Progmmming and Component Engineering (GPCE'05), volume 3676 of LNCS, pages 157-172. Springer, Sept. 2005.
    • (2005) LNCS , vol.3676 , pp. 157-172
    • Bravenboer, M.1    Vermaas, R.2    Vinju, J.3    Visser, E.4
  • 8
    • 12844281062 scopus 로고    scopus 로고
    • Concrete syntax for objects. Domain-specific language embedding and assimilation without restrictions
    • Vancouver, Canada, Oct, ACM Press
    • M. Bravenboer and E. Visser. Concrete syntax for objects. Domain-specific language embedding and assimilation without restrictions. In Object-Oriented Programing, Systems, Languages, and Applications (OOPSLA'04), pages 365-383, Vancouver, Canada, Oct. 2004. ACM Press.
    • (2004) Object-Oriented Programing, Systems, Languages, and Applications (OOPSLA'04) , pp. 365-383
    • Bravenboer, M.1    Visser, E.2
  • 10
    • 35248891044 scopus 로고    scopus 로고
    • Precise analysis of string expressions
    • Static Analysis Symposium SAS '03, of, Springer, June
    • A. S. Christensen, A. Møller, and M. I. Schwartzbach. Precise analysis of string expressions. In Static Analysis Symposium (SAS '03), volume 2694 of LNCS, pages 1-18. Springer, June 2003.
    • (2003) LNCS , vol.2694 , pp. 1-18
    • Christensen, A.S.1    Møller, A.2    Schwartzbach, M.I.3
  • 11
    • 31344435513 scopus 로고    scopus 로고
    • Safe Query Objects: Statically typed objects as remotely executable queries
    • ACM Press, May
    • W. R. Cook and S. Rai. Safe Query Objects: Statically typed objects as remotely executable queries. In Intl. Conf on Software Engineering (ICSE 2005), pages 97-106. ACM Press, May 2005.
    • (2005) Intl. Conf on Software Engineering (ICSE 2005) , pp. 97-106
    • Cook, W.R.1    Rai, S.2
  • 13
    • 4544280668 scopus 로고    scopus 로고
    • Static checking of dynamically generated queries in database applications
    • May
    • C. Gould, Z. Su, and P. Devanbu. Static checking of dynamically generated queries in database applications. In Intl. Conf. on Software Engineering (ICSE 2004), pages 645-654, May 2004.
    • (2004) Intl. Conf. on Software Engineering (ICSE 2004) , pp. 645-654
    • Gould, C.1    Su, Z.2    Devanbu, P.3
  • 14
    • 77952407110 scopus 로고    scopus 로고
    • AMNESIA: Analysis and Monitoring for NEutralizing SQL-Injection Attacks
    • Long Beach, California, USA, Nov
    • W. G. Halfond and A. Orso. AMNESIA: Analysis and Monitoring for NEutralizing SQL-Injection Attacks. In 20th Intl. Conf. on Automated Software Engineering (ASE 2005), pages 174-183, Long Beach, California, USA, Nov. 2005.
    • (2005) 20th Intl. Conf. on Automated Software Engineering (ASE 2005) , pp. 174-183
    • Halfond, W.G.1    Orso, A.2
  • 20
    • 84923564816 scopus 로고    scopus 로고
    • Finding security vulnerabilities in Java applications with static analysis
    • USENIX, Aug
    • V. B. Livshits and M. S. Lam. Finding security vulnerabilities in Java applications with static analysis. In 14th USENIX Security Symposium, pages 271-286. USENIX, Aug. 2005.
    • (2005) 14th USENIX Security Symposium , pp. 271-286
    • Livshits, V.B.1    Lam, M.S.2
  • 21
    • 38849144664 scopus 로고    scopus 로고
    • O. Maor and A. Shulman. SQL injection signatures evasion. White paper, http://www.imperva.com/, Apr. 2004.
    • O. Maor and A. Shulman. SQL injection signatures evasion. White paper, http://www.imperva.com/, Apr. 2004.
  • 24
    • 38849125590 scopus 로고    scopus 로고
    • A. Møller. dk.brics.automaton - finite-state automata for Java. http://www.brics.dk/automaton/, 2005.
    • A. Møller. dk.brics.automaton - finite-state automata for Java. http://www.brics.dk/automaton/, 2005.
  • 25
    • 33745811685 scopus 로고    scopus 로고
    • The essence of command injection attacks in web applications
    • Charleston, South Carolina, USA, Jan, ACM Press
    • Z. Su and G. Wassermann. The essence of command injection attacks in web applications. In Principles of Programming Languages (POPL'06), pages 372-382, Charleston, South Carolina, USA, Jan. 2006. ACM Press.
    • (2006) Principles of Programming Languages (POPL'06) , pp. 372-382
    • Su, Z.1    Wassermann, G.2
  • 27
    • 84937403401 scopus 로고    scopus 로고
    • Meta-programming with concrete object syntax
    • Generative Programming and Component Engineering GPCE'02, of, Pittsburgh, PA, USA, Oct, Springer-Verlag
    • E. Visser. Meta-programming with concrete object syntax. In Generative Programming and Component Engineering (GPCE'02), volume 2487 of LNCS, pages 299-315, Pittsburgh, PA, USA, Oct. 2002. Springer-Verlag.
    • (2002) LNCS , vol.2487 , pp. 299-315
    • Visser, E.1
  • 28
    • 84947264529 scopus 로고    scopus 로고
    • E. Visser. Program transformation with Stratego/XT: Rules, strategies, tools, and systems in Stratego/XT 0.9. In C. Lengauer et al., editors, Domain-Specific Program Generation, 3016 of LNCS, pages 216-238. Spinger-Verlag, June 2004.
    • E. Visser. Program transformation with Stratego/XT: Rules, strategies, tools, and systems in Stratego/XT 0.9. In C. Lengauer et al., editors, Domain-Specific Program Generation, volume 3016 of LNCS, pages 216-238. Spinger-Verlag, June 2004.
  • 29
    • 84910681237 scopus 로고    scopus 로고
    • Static detection of security vulnerabilities in scripting languages
    • USENIX, Aug
    • Y. Xie and A. Aiken. Static detection of security vulnerabilities in scripting languages. In 15th USENIX Security Symposium, pages 179-192. USENIX, Aug. 2006.
    • (2006) 15th USENIX Security Symposium , pp. 179-192
    • Xie, Y.1    Aiken, A.2
  • 30
    • 35048855974 scopus 로고    scopus 로고
    • Generating AspectJ programs with Meta-AspectJ
    • Generative Programming and Component Engineering: Third Intl. Conf, GPCE 2004, of, Vancouver, Canada, October, Springer
    • D. Zook, S. S. Huang, and Y. Smaragdakis. Generating AspectJ programs with Meta-AspectJ. In Generative Programming and Component Engineering: Third Intl. Conf, GPCE 2004, volume 3286 of LNCS, pages 1-19, Vancouver, Canada, October 2004. Springer.
    • (2004) LNCS , vol.3286 , pp. 1-19
    • Zook, D.1    Huang, S.S.2    Smaragdakis, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.