-
1
-
-
0038304275
-
Advanced SQL Injection In SQL Server Applications
-
white paper, Next Generation Security Software
-
C. Anley, "Advanced SQL Injection In SQL Server Applications," white paper, Next Generation Security Software, 2002.
-
(2002)
-
-
Anley, C.1
-
3
-
-
77953855187
-
Using Parse Tree Validation to Prevent SQL Injection Attacks
-
Sept
-
G.T. Buehrer, B.W. Weide, and P.A.G. Sivilotti, "Using Parse Tree Validation to Prevent SQL Injection Attacks," Proc. Fifth Int'l Workshop Software Eng. and Middleware, pp. 106-113, Sept. 2005.
-
(2005)
Proc. Fifth Int'l Workshop Software Eng. and Middleware
, pp. 106-113
-
-
Buehrer, G.T.1
Weide, B.W.2
Sivilotti, P.A.G.3
-
4
-
-
34548212308
-
Dytan: A Generic Dynamic Taint Analysis Framework
-
July
-
J. Clause, W. Li, and A. Orso, "Dytan: A Generic Dynamic Taint Analysis Framework," Proc. Int'l Symp. Software Testing and Analysis, pp. 196-206, July 2007.
-
(2007)
Proc. Int'l Symp. Software Testing and Analysis
, pp. 196-206
-
-
Clause, J.1
Li, W.2
Orso, A.3
-
5
-
-
31344435513
-
Safe Query Objects: Statically Typed Objects as Remotely Executable Queries
-
May
-
W.R. Cook and S. Rai, "Safe Query Objects: Statically Typed Objects as Remotely Executable Queries," Proc. 27th Int'l Conf. Software Eng. pp. 97-106, May 2005.
-
(2005)
Proc. 27th Int'l Conf. Software Eng
, pp. 97-106
-
-
Cook, W.R.1
Rai, S.2
-
7
-
-
4544287108
-
Proc. 26th Int'l Conf. Software Eng
-
formal demos, pp, May
-
C. Gould, Z. Su, and P. Devanbu, "JDBC Checker: A Static Analysis Tool for SQL/JDBC Applications," Proc. 26th Int'l Conf. Software Eng., formal demos, pp. 697-698, May 2004.
-
(2004)
, pp. 697-698
-
-
Gould, C.1
Su, Z.2
Devanbu, P.3
-
8
-
-
4544280668
-
Static Checking of Dynamically Generated Queries in Database Applications
-
May
-
C. Gould, Z. Su, and P. Devanbu, "Static Checking of Dynamically Generated Queries in Database Applications," Proc. 26th Int'l Conf. Software Eng., pp. 645-654, May 2004.
-
(2004)
Proc. 26th Int'l Conf. Software Eng
, pp. 645-654
-
-
Gould, C.1
Su, Z.2
Devanbu, P.3
-
9
-
-
33846310068
-
Dynamic Taint Propagation for Java
-
Dec
-
V. Haldar, D. Chandra, and M. Franz, "Dynamic Taint Propagation for Java," Proc. 21st Ann. Computer Security Applications Conf., pp. 303-311, Dec. 2005.
-
(2005)
Proc. 21st Ann. Computer Security Applications Conf
, pp. 303-311
-
-
Haldar, V.1
Chandra, D.2
Franz, M.3
-
10
-
-
34547379435
-
Using Positive Tainting and Syntax-Aware Evaluation to Counter SQL Injection Attacks
-
Nov
-
W. Halfond, A. Orso, and P. Manolios, "Using Positive Tainting and Syntax-Aware Evaluation to Counter SQL Injection Attacks," Proc. ACM SIGSOFT Symp. Foundations of Software Eng., pp. 175-185, Nov. 2006.
-
(2006)
Proc. ACM SIGSOFT Symp. Foundations of Software Eng
, pp. 175-185
-
-
Halfond, W.1
Orso, A.2
Manolios, P.3
-
14
-
-
84880450431
-
Web Application Security Assessment by Fault Injection and Behavior Monitoring
-
May
-
Y. Huang, S. Huang, T. Lin, and C. Tsai, "Web Application Security Assessment by Fault Injection and Behavior Monitoring," Proc. 12th Int'l Conf. World Wide Web, pp. 148-159, May 2003.
-
(2003)
Proc. 12th Int'l Conf. World Wide Web
, pp. 148-159
-
-
Huang, Y.1
Huang, S.2
Lin, T.3
Tsai, C.4
-
15
-
-
19944365247
-
Securing Web Application Code by Static Analysis and Runtime Protection
-
May
-
Y. Huang, F. Yu, C. Hang, C.H. Tsai, D.T. Lee, and S.Y. Kuo, "Securing Web Application Code by Static Analysis and Runtime Protection," Proc. 13th Int'l Conf. World Wide Web, pp. 40-52, May 2004.
-
(2004)
Proc. 13th Int'l Conf. World Wide Web
, pp. 40-52
-
-
Huang, Y.1
Yu, F.2
Hang, C.3
Tsai, C.H.4
Lee, D.T.5
Kuo, S.Y.6
-
17
-
-
33745934031
-
Precise Alias Analysis for Static Detection of Web Application Vulnerabilities
-
June
-
N. Jovanovic, C. Kruegel, and E. Kirda, "Precise Alias Analysis for Static Detection of Web Application Vulnerabilities," Proc. Workshop Programming Languages and Analysis for Security, pp. 27-36, June 2006.
-
(2006)
Proc. Workshop Programming Languages and Analysis for Security
, pp. 27-36
-
-
Jovanovic, N.1
Kruegel, C.2
Kirda, E.3
-
18
-
-
84923564816
-
Finding Security Vulnerabilities in Java Applications with Static Analysis
-
Aug
-
V.B. Livshits and M.S. Lam, "Finding Security Vulnerabilities in Java Applications with Static Analysis," Proc. 14th Usenix Security Symp. Aug. 2005.
-
(2005)
Proc. 14th Usenix Security Symp
-
-
Livshits, V.B.1
Lam, M.S.2
-
19
-
-
40449087507
-
-
O. Maor and A. Shulman, SQL Injection Signatures Evasion, white paper, Imperva, http://www.imperva.com/application-defense_center/ white_papers/sql_injection_signatures_evasion.html, Apr. 2004.
-
O. Maor and A. Shulman, "SQL Injection Signatures Evasion," white paper, Imperva, http://www.imperva.com/application-defense_center/ white_papers/sql_injection_signatures_evasion.html, Apr. 2004.
-
-
-
-
20
-
-
31744432699
-
Finding Application Errors and Security Flaws Using PQL: A Program Query Language
-
Oct
-
M. Martin, B. Livshits, and M.S. Lam, "Finding Application Errors and Security Flaws Using PQL: A Program Query Language," Proc. 20th Ann. ACM SIGPLAN Conf. Object Oriented Programming Systems Languages and Applications, pp. 365-383, Oct. 2005.
-
(2005)
Proc. 20th Ann. ACM SIGPLAN Conf. Object Oriented Programming Systems Languages and Applications
, pp. 365-383
-
-
Martin, M.1
Livshits, B.2
Lam, M.S.3
-
21
-
-
33244471315
-
-
R. McClure and 1. Kr6ger, SQL DOM: Compile Time Checking of Dynamic SQL Statements, Proc. 27th Int'l Conf. Software Eng., pp. 88-96, May 2005.
-
R. McClure and 1. Kr6ger, "SQL DOM: Compile Time Checking of Dynamic SQL Statements," Proc. 27th Int'l Conf. Software Eng., pp. 88-96, May 2005.
-
-
-
-
22
-
-
79953672829
-
Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
-
Feb
-
J. Newsome and D. Song, "Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software," Proc. 12th Ann. Network and Distributed System Security Symp., Feb. 2005.
-
(2005)
Proc. 12th Ann. Network and Distributed System Security Symp
-
-
Newsome, J.1
Song, D.2
-
23
-
-
84871349041
-
Automatically Hardening Web Applications Using Precise Tainting Information
-
May
-
A. Nguyen-Tuong, S. Guarnieri, D. Greene, J. Shirley, and D. Evans, "Automatically Hardening Web Applications Using Precise Tainting Information," Proc. 20th IFIP Int'l Information Security Conf., May 2005.
-
(2005)
Proc. 20th IFIP Int'l Information Security Conf
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Shirley, J.4
Evans, D.5
-
30
-
-
84910681237
-
Static Detection of Security Vulnerabilities in Scripting Languages
-
Aug
-
Y. Xie and A. Aiken, "Static Detection of Security Vulnerabilities in Scripting Languages," Proc. 15th Usenix Security Symp., Aug. 2006.
-
(2006)
Proc. 15th Usenix Security Symp
-
-
Xie, Y.1
Aiken, A.2
-
31
-
-
85038810709
-
Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks
-
Aug
-
W. Xu, S. Bhatkar, and R. Sekar, "Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks," Proc. 15th Usenix Security Symp., Aug. 2006.
-
(2006)
Proc. 15th Usenix Security Symp
-
-
Xu, W.1
Bhatkar, S.2
Sekar, R.3
|