메뉴 건너뛰기




Volumn 28, Issue 3-4, 2009, Pages 121-129

SDriver: Location-specific signatures prevent SQL injection attacks

Author keywords

Firewall; JDBC driver; SQL injection attack; SQLIA; Web security

Indexed keywords

APPLICATIONS; AUTOMOBILE DRIVERS; COMPUTER SYSTEM FIREWALLS; MANAGEMENT INFORMATION SYSTEMS; NETWORK SECURITY; WORLD WIDE WEB;

EID: 63049106185     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2008.09.005     Document Type: Article
Times cited : (24)

References (30)
  • 3
    • 0002190545 scopus 로고    scopus 로고
    • Test infected: programmers love writing tests
    • Beck K., and Gamma E. Test infected: programmers love writing tests. Java Report 3 7 (July 1998) 37-50
    • (1998) Java Report , vol.3 , Issue.7 , pp. 37-50
    • Beck, K.1    Gamma, E.2
  • 4
    • 35048851186 scopus 로고    scopus 로고
    • SQLrand: preventing SQL injection attacks
    • Proceedings of the second applied cryptography and network security (ACNS) conference. Jakobsson M., Yung M., and Zhou J. (Eds), Springer-Verlag
    • Boyd S., and Keromytis A. SQLrand: preventing SQL injection attacks. In: Jakobsson M., Yung M., and Zhou J. (Eds). Proceedings of the second applied cryptography and network security (ACNS) conference. Lecture notes in computer science vol. 3089 (2004), Springer-Verlag 292-304
    • (2004) Lecture notes in computer science , vol.3089 , pp. 292-304
    • Boyd, S.1    Keromytis, A.2
  • 6
    • 63049125089 scopus 로고    scopus 로고
    • CERT, Available online:, accessed January 7, 2007
    • CERT. CERT vulnerability note VU282403; 2002. Available online: [accessed January 7, 2007].
    • CERT vulnerability note VU282403; 2002
  • 17
    • 34248356409 scopus 로고    scopus 로고
    • Guest editors' introduction: TDD-the art of fearless programming
    • Jeffries R., and Melnik G. Guest editors' introduction: TDD-the art of fearless programming. IEEE Software 24 3 (May 2007) 24-30
    • (2007) IEEE Software , vol.24 , Issue.3 , pp. 24-30
    • Jeffries, R.1    Melnik, G.2
  • 19
    • 0003352252 scopus 로고
    • The art of computer programming
    • Addison-Wesley, Reading, MA
    • Knuth D.E. The art of computer programming. Sorting and searching vol. 3 (1973), Addison-Wesley, Reading, MA
    • (1973) Sorting and searching , vol.3
    • Knuth, D.E.1
  • 20
    • 84956982801 scopus 로고    scopus 로고
    • Learning fingerprints for a database intrusion detection system
    • ESORICS '02: proceedings of the 7th European symposium on research in computer security. Gollmann D., Karjoth G., and Waidner M. (Eds), Springer-Verlag, London, UK
    • Lee S.Y., Low W.L., and Wong P.Y. Learning fingerprints for a database intrusion detection system. In: Gollmann D., Karjoth G., and Waidner M. (Eds). ESORICS '02: proceedings of the 7th European symposium on research in computer security. Lecture notes in computer science 2502 (2002), Springer-Verlag, London, UK 264-280
    • (2002) Lecture notes in computer science 2502 , pp. 264-280
    • Lee, S.Y.1    Low, W.L.2    Wong, P.Y.3
  • 23
    • 63049131449 scopus 로고    scopus 로고
    • Countering SQL injection attacks with a database driver
    • Papatheodorou T.S., Christodoulakis D.N., and Karanikolas N.N. (Eds), New Technologies Publications, Athens
    • Mitropoulos D., and Spinellis D. Countering SQL injection attacks with a database driver. In: Papatheodorou T.S., Christodoulakis D.N., and Karanikolas N.N. (Eds). Current trends in informatics: 11th panhellenic conference on informatics, PCI 2007 vol. B (May 2007), New Technologies Publications, Athens 105-115
    • (2007) Current trends in informatics: 11th panhellenic conference on informatics, PCI 2007 , vol.B , pp. 105-115
    • Mitropoulos, D.1    Spinellis, D.2
  • 24
    • 84889855627 scopus 로고    scopus 로고
    • Available online:, accessed January 7, 2007
    • Spett K. Blind SQL injection; 2004. Available online: [accessed January 7, 2007].
    • (2004) Blind SQL injection
    • Spett, K.1
  • 26
    • 26444575798 scopus 로고    scopus 로고
    • A learning-based approach to the detection of SQL attacks
    • Intrusion and malware detection and vulnerability assessment: second international conference, DIMVA 2005. Julisch K., and Kruegel C. (Eds)
    • Valeur F., Mutz D., and Vigna G. A learning-based approach to the detection of SQL attacks. In: Julisch K., and Kruegel C. (Eds). Intrusion and malware detection and vulnerability assessment: second international conference, DIMVA 2005. Lecture notes in computer science 3548 (July 2005) 123-140
    • (2005) Lecture notes in computer science 3548 , pp. 123-140
    • Valeur, F.1    Mutz, D.2    Vigna, G.3
  • 29
    • 85038810709 scopus 로고    scopus 로고
    • Taint-enhanced policy enforcement: a practical approach to defeat a wide range of attacks
    • USENIX Association, Berkeley, CA
    • Xu W., Bhatkar S., and Sekar R. Taint-enhanced policy enforcement: a practical approach to defeat a wide range of attacks. Security '06: proceedings of the 15th USENIX security symposium (August 2006), USENIX Association, Berkeley, CA 121-136
    • (2006) Security '06: proceedings of the 15th USENIX security symposium , pp. 121-136
    • Xu, W.1    Bhatkar, S.2    Sekar, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.