-
1
-
-
52449130537
-
-
The Open Web Application Security Project OWASP, Accessed Feb 2008
-
The Open Web Application Security Project (OWASP), www.owasp.org (Accessed Feb 2008)
-
-
-
-
2
-
-
77953855187
-
Using parse tree validation to prevent SQL injection attacks
-
Lisbon, Portugal
-
G. Buehrer, B. W. Weide, P. A. G. Sivilotti, "Using parse tree validation to prevent SQL injection attacks", Proceedings of the 5th International Workshop on Software Engineering and Middleware (SEM '05), Lisbon, Portugal, 2005, pp. 106-113.
-
(2005)
Proceedings of the 5th International Workshop on Software Engineering and Middleware (SEM '05)
, pp. 106-113
-
-
Buehrer, G.1
Weide, B.W.2
Sivilotti, P.A.G.3
-
4
-
-
33745811685
-
The Essence of Command Injection Attacks in Web Applications
-
Jan, South Carolina, USA, pp
-
Z. Su and G. Wasserman, "The Essence of Command Injection Attacks in Web Applications", In Proceedings of Symposium on Principles of Programming Languages POPL '06, Jan 2006, South Carolina, USA, pp. 372-382.
-
(2006)
Proceedings of Symposium on Principles of Programming Languages POPL '06
, pp. 372-382
-
-
Su, Z.1
Wasserman, G.2
-
5
-
-
48649100112
-
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Injection
-
ACSAC, Miami, Dec, 2007
-
rd Annual Computer Security Applications Conference, 2007 (ACSAC 2007), Miami, Dec 2007, pp. 107-117.
-
(2007)
rd Annual Computer Security Applications Conference
, pp. 107-117
-
-
Kosuga, Y.1
Kono, K.2
Hanaoka, M.3
Hishiyama, M.4
Takahama, Y.5
-
6
-
-
77952407110
-
AMNESIA: Analysis and Monitoring for NEutralizing SQL-Injection Attacks
-
Nov, Long Beach, CA, USA, pp
-
W. Halfond, and A. Orso, "AMNESIA: Analysis and Monitoring for NEutralizing SQL-Injection Attacks", In Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005), Nov 2005, Long Beach, CA, USA, pp.174-183.
-
(2005)
Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005)
, pp. 174-183
-
-
Halfond, W.1
Orso, A.2
-
7
-
-
46849091708
-
SQLUnitGen: SQL Injection Testing Using Static and Dynamic Analysis
-
Raleigh, NC, ISBN 978-0-9671473-3-3-8
-
Y. Shin, L. Williams, and T. Xie, "SQLUnitGen: SQL Injection Testing Using Static and Dynamic Analysis", In Proceedings of the International Symposium on Software Reliability Engineering (ISSRE), 2006, Raleigh, NC, ISBN 978-0-9671473-3-3-8.
-
(2006)
Proceedings of the International Symposium on Software Reliability Engineering (ISSRE)
-
-
Shin, Y.1
Williams, L.2
Xie, T.3
-
8
-
-
3242808612
-
Ninth CSI/FBI computer crime and security survey
-
Technical Report RL32331, C.S.I. Computer Security Institute
-
L. A. Gordon, M. P. Loeb, W.Lucyshyn, and R. Richardson., "Ninth CSI/FBI computer crime and security survey", Technical Report RL32331, C.S.I. Computer Security Institute, 2004.
-
(2004)
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
Richardson, R.4
-
10
-
-
84871953508
-
-
Accessed Feb 2008
-
SQL Injection Walkthrough, www.securiteam.com/securityreviews/5DP0N1P76E. html (Accessed Feb 2008)
-
SQL Injection Walkthrough
-
-
-
11
-
-
38049062092
-
The Automatic Defense Mechanism for Malicious Injection Attack
-
Fukushima, Japan, Oct
-
J. Lin and J. Chen, "The Automatic Defense Mechanism for Malicious Injection Attack", In Proceedings of Seventh International Conference on Computer and Information Technology (CIT2007), Fukushima, Japan, Oct 2007, pp. 709-714.
-
(2007)
Proceedings of Seventh International Conference on Computer and Information Technology (CIT2007)
, pp. 709-714
-
-
Lin, J.1
Chen, J.2
-
13
-
-
52449092059
-
SQL-IDS: A Specification-based Approach for SQL-Injection Detection
-
Mar, Fortaleza, pp
-
K. Kemalis and T. Tzouramanis, "SQL-IDS: A Specification-based Approach for SQL-Injection Detection", In Proceedings of 23rd ACM Symposium on Applied Computing (SAC'08), Mar 2008, Fortaleza, pp. 2153-2158.
-
(2008)
Proceedings of 23rd ACM Symposium on Applied Computing (SAC'08)
, pp. 2153-2158
-
-
Kemalis, K.1
Tzouramanis, T.2
-
14
-
-
33846522937
-
Fault-based Testing of Database Application Programs with Conceptual Data Model
-
Los Alamitos, California
-
W.K. Chan, S.C. Cheung, and T.H. Tse, "Fault-based Testing of Database Application Programs with Conceptual Data Model", In Proceedings of the Fifth International Conference on Quality Software (QSIC 2005), Los Alamitos, California, 2005
-
(2005)
Proceedings of the Fifth International Conference on Quality Software (QSIC 2005)
-
-
Chan, W.K.1
Cheung, S.C.2
Tse, T.H.3
-
15
-
-
33846467766
-
Mutating Database Queries
-
April
-
J. Tuya, M. Suárez-Cabal, and C. Riva, "Mutating Database Queries", Information and Software Technology, 49(4) 398-417, April 2007.
-
(2007)
Information and Software Technology
, vol.49
, Issue.4
, pp. 398-417
-
-
Tuya, J.1
Suárez-Cabal, M.2
Riva, C.3
-
16
-
-
52449088499
-
-
Accessed from
-
Jcrasher, Accessed from www.cc.gatech.edu/jcrasher.
-
Jcrasher
-
-
-
17
-
-
0017959155
-
Hints on test data selection: Help for the practicing programmer
-
R. DeMillo, R. Lipton, and F. Sayward, "Hints on test data selection: Help for the practicing programmer", IEEE Computer Magazine, Volume 11, Issue 4, 1978, pp. 34-41.
-
(1978)
IEEE Computer Magazine
, vol.11
, Issue.4
, pp. 34-41
-
-
DeMillo, R.1
Lipton, R.2
Sayward, F.3
-
18
-
-
0020152782
-
Weak mutation testing and completeness of test sets
-
July
-
W. E. Howden, "Weak mutation testing and completeness of test sets," IEEE Transaction on Software Engineering, Volume 8, Number 4, July 1982, pp. 371-379.
-
(1982)
IEEE Transaction on Software Engineering
, vol.8
, Issue.4
, pp. 371-379
-
-
Howden, W.E.1
-
19
-
-
34247113296
-
A Classification of SQL-Injection Attacks and Countermeasures
-
Arlington, Virginia, Mar
-
W. G. Halfond, J. Viegas, and A. Orso, "A Classification of SQL-Injection Attacks and Countermeasures", In Proceedings of the International Symposium on Secure Software Engineering (ISSSE 2006), Arlington, Virginia, Mar. 2006.
-
(2006)
Proceedings of the International Symposium on Secure Software Engineering (ISSSE 2006)
-
-
Halfond, W.G.1
Viegas, J.2
Orso, A.3
-
20
-
-
47349131989
-
Testing security policies: Going beyond functional testing
-
Trollhättan, Sweden, November
-
T. Mouelhi, Y. Le Traon, and B. Baudry. "Testing security policies: going beyond functional testing". In Proceedings of International Symposium on Software Reliability Engineering (ISSRE'07), Trollhättan, Sweden, November 2007.
-
(2007)
Proceedings of International Symposium on Software Reliability Engineering (ISSRE'07)
-
-
Mouelhi, T.1
Le Traon, Y.2
Baudry, B.3
-
21
-
-
0031354777
-
Software Unit Test Coverage and Adequacy
-
Dec
-
H. Zhu, P. A. V. Hall, and J. H. R. May, "Software Unit Test Coverage and Adequacy", ACM Computing Surveys (CSUR), Volume 29, Issue 4, Dec. 1997, pp. 366-427.
-
(1997)
ACM Computing Surveys (CSUR)
, vol.29
, Issue.4
, pp. 366-427
-
-
Zhu, H.1
Hall, P.A.V.2
May, J.H.R.3
-
22
-
-
52449087655
-
-
Open Source Web Applications with Source Code in ASP, JSP, PHP, Perl, ColdFusion, ASP.NET/C#, http://gotocode.com (Accessed Feb 2008).
-
Open Source Web Applications with Source Code in ASP, JSP, PHP, Perl, ColdFusion, ASP.NET/C#, http://gotocode.com (Accessed Feb 2008).
-
-
-
|