-
1
-
-
77952381936
-
-
Online SQL syntax checker
-
Online SQL syntax checker. http://www.wangz.net/gsqlparser/sqlpp/ sqlformat.htm.
-
-
-
-
2
-
-
77952369918
-
How prevalent are SQL injection vulnerabilities?
-
Oct
-
SUTTON, M. How prevalent Are SQL Injection vulnerabilities? Internet Bulletin, Oct. 2006.
-
(2006)
Internet Bulletin
-
-
Sutton, M.1
-
3
-
-
17044362578
-
Synthesis of interface specifications for JAVA classes
-
ALUR, R., CERNÝ, P., MADHUSUDAN, P., AND NAM, W. Synthesis of interface specifications for JAVA classes. In POPL (2005), pp. 98-109.
-
(2005)
POPL
, pp. 98-109
-
-
Alur, R.1
Cerný, P.2
Madhusudan, P.3
Nam, W.4
-
4
-
-
0036038253
-
Mining specifications
-
AMMONS, G., BODÍK, R., AND LARUS, J. R. Mining specifications. In POPL (2002), pp. 4-16.
-
(2002)
POPL
, pp. 4-16
-
-
Ammons, G.1
Bodík, R.2
Larus, J.R.3
-
5
-
-
0038304275
-
Advanced SQL injection in SQL server applications
-
Next Generation Security Software Ltd. Tech. rep.
-
ANLEY, C. Advanced SQL injection in SQL server applications, White paper, Next Generation Security Software Ltd. Tech. rep., 2002.
-
(2002)
White Paper
-
-
Anley, C.1
-
6
-
-
77952418442
-
-
APACHE
-
APACHE. The JMeter project. http://jakarta.apache.org/jmeter/.
-
The JMeter Project
-
-
-
7
-
-
0003400255
-
Integrity considerations for secure computer systems
-
USAF Electronic Systems Division, Bedford, MA, Apr
-
BIBA, K. J. Integrity considerations for secure computer systems. Tech. Rep. ESD-TR-76-372, USAF Electronic Systems Division, Bedford, MA, Apr. 1977.
-
(1977)
Tech. Rep. ESD-TR-76-372
-
-
Biba, K.J.1
-
8
-
-
35048851186
-
Sqlrand: Preventing SQL injection attacks
-
BOYD, S. W., AND KEROMYTIS, A. D. Sqlrand: Preventing SQL injection attacks. In ACNS (2004), pp. 292-302.
-
(2004)
ACNS
, pp. 292-302
-
-
Boyd, S.W.1
Keromytis, A.D.2
-
9
-
-
77953855187
-
Using parse tree validation to prevent SQL injection attacks
-
2005
-
BUEHRER, G., WEIDE, B. W., AND SIVILOTTI, P. A. G. Using parse tree validation to prevent SQL injection attacks. In SEM (2005).
-
SEM
-
-
Buehrer, G.1
Weide, B.W.2
Sivilotti, P.A.G.3
-
10
-
-
31344435513
-
Safe query objects: Statically typed objects as remotely executable queries
-
COOK, W. R., AND RAI, S. Safe query objects: statically typed objects as remotely executable queries. In ICSE (2005), pp. 97-106.
-
(2005)
ICSE
, pp. 97-106
-
-
Cook, W.R.1
Rai, S.2
-
12
-
-
77952407110
-
AMNESIA: Analysis and Monitoring for NEutralizing SQL-Injection Attacks
-
HALFOND, W., AND ORSO, A. AMNESIA: Analysis and Monitoring for NEutralizing SQL-Injection Attacks. In ASE (2005), pp. 174-183.
-
(2005)
ASE
, pp. 174-183
-
-
Halfond, W.1
Orso, A.2
-
13
-
-
34547379435
-
Using positive tainting and syntax-aware evaluation to counter SQL injection attacks
-
HALFOND, W., ORSO, A., AND MANOLIOS, P. Using Positive Tainting and Syntax-Aware Evaluation to Counter SQL Injection Attacks. In FSE (2006), pp. 175-185.
-
(2006)
FSE
, pp. 175-185
-
-
Halfond, W.1
Orso, A.2
Manolios, P.3
-
14
-
-
40449116802
-
A classification of SQL-injection attacks and countermeasures
-
HALFOND, W. G., VIEGAS, J., AND ORSO, A. A Classification of SQL-Injection Attacks and Countermeasures. In SSSE (2006).
-
(2006)
SSSE
-
-
Halfond, W.G.1
Viegas, J.2
Orso, A.3
-
15
-
-
77952339846
-
-
Secureworks press release. Internet news report, July
-
Secureworks press release. Internet news report, July 2006. http://www.secureworks.com/press/20060718-sql.html.
-
(2006)
-
-
-
16
-
-
84923564816
-
Finding security vulnerabilities in Java applications with static analysis
-
LIVSHITS, V. B., AND LAM, M. S. Finding security vulnerabilities in Java applications with static analysis. In USENIX Security Symposium (2005).
-
(2005)
USENIX Security Symposium
-
-
Livshits, V.B.1
Lam, M.S.2
-
17
-
-
33244471315
-
SQL DOM: Compile time checking of dynamic SQL statements
-
MCCLURE, R. A., AND KRÜGER, I. H. SQL DOM: compile time checking of dynamic SQL statements. In ICSE (2005), pp. 88-96.
-
(2005)
ICSE
, pp. 88-96
-
-
McClure, R.A.1
Krüger, I.H.2
-
19
-
-
84871349041
-
Automatically hardening web applications using precise tainting
-
NGUYEN-TUONG, A., GUARNIERI, S., GREENE, D., SHIRLEY, J., AND EVANS, D. Automatically hardening web applications using precise tainting. In SEC (2005), pp. 295-308.
-
(2005)
SEC
, pp. 295-308
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Shirley, J.4
Evans, D.5
-
21
-
-
33745213901
-
Defending against injection attacks through context-sensitive string evaluation
-
PIETRASZEK, T., AND BERGHE, C. V. Defending against injection attacks through context-sensitive string evaluation. In RAID (2005).
-
(2005)
RAID
-
-
Pietraszek, T.1
Berghe, C.V.2
-
22
-
-
51749106501
-
Language-based information-flow security
-
SABELFELD, A., AND MYERS, A. C. Language-based information-flow security. IEEE JSA, (2003).
-
(2003)
IEEE JSA
-
-
Sabelfeld, A.1
Myers, A.C.2
-
24
-
-
33745216482
-
The essence of command injection attacks in web applications
-
SU, Z., AND WASSERMANN, G. The essence of command injection attacks in web applications. In POPL (2006), pp. 372-382.
-
(2006)
POPL
, pp. 372-382
-
-
Su, Z.1
Wassermann, G.2
-
25
-
-
77949457347
-
-
Internet, September
-
Dark reading security analysis. Internet, September 2006. http://www.darkreading.com/document.asp? doc-id=103774&WT.svl=news1-3.
-
(2006)
Dark Reading Security Analysis
-
-
-
26
-
-
26444575798
-
A learning-based approach to the detection of SQL attacks
-
Detection of Instructions and Malware, and Vulnerability Assessment: Second International Conference, DIMVA 2005. Proceedings
-
VALEUR, F., MUTZ, D., AND VIGNA, G. A learning-based approach to the detection of SQL attacks. In DIMVA (2005), pp. 123-140. (Pubitemid 41423153)
-
(2005)
Lecture Notes in Computer Science
, vol.3548
, pp. 123-140
-
-
Valeur, F.1
Mutz, D.2
Vigna, G.3
-
28
-
-
24644493674
-
Mining temporal specifications for error detection
-
WEIMER, W., AND NECULA, G. C. Mining temporal specifications for error detection. In TACAS (2005), pp. 461-476.
-
(2005)
TACAS
, pp. 461-476
-
-
Weimer, W.1
Necula, G.C.2
-
29
-
-
84910681237
-
Static detection of security vulnerabilities in scripting languages
-
XIE, Y., AND AIKEN, A. Static detection of security vulnerabilities in scripting languages. In USENIX Security Symposium (2006).
-
(2006)
USENIX Security Symposium
-
-
Xie, Y.1
Aiken, A.2
-
30
-
-
85038810709
-
Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
-
XU, W., BHATKAR, S., AND SEKAR, R. Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. In 15th USENIX Security Symposium (2006).
-
(2006)
15th USENIX Security Symposium
-
-
Xu, W.1
Bhatkar, S.2
Sekar, R.3
|