메뉴 건너뛰기




Volumn , Issue , 2009, Pages 1411-1414

An approach for SQL injection vulnerability detection

Author keywords

[No Author keywords available]

Indexed keywords

FALSE NEGATIVES; FALSE POSITIVE; PROTOTYPE TOOLS; RESEARCH OBJECTIVES; RUNTIMES; SQL INJECTION; VULNERABILITY DETECTION; WEB APPLICATION;

EID: 77951105286     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ITNG.2009.34     Document Type: Conference Paper
Times cited : (49)

References (9)
  • 2
    • 0038304275 scopus 로고    scopus 로고
    • White Paper, Next Generation Security Software Ltd.
    • C. Anley, Advanced SQL Injection In SQL Server Applications. White Paper, Next Generation Security Software Ltd., 2000. http://www.ngssoftware.com/ papers/advanced-sql-injection.pdf.
    • (2000) Advanced SQL Injection in SQL Server Applications
    • Anley, C.1
  • 6
    • 33746592989 scopus 로고    scopus 로고
    • Putting the Tools to Work: How to Succeed with Source Code Analysis
    • P. Chandra, B. Chess, and J. Steven, "Putting the Tools to Work: How to Succeed with Source Code Analysis," IEEE Security and Privacy, vol.4, no.3, pp. 80-83, 2006.
    • (2006) IEEE Security and Privacy , vol.4 , Issue.3 , pp. 80-83
    • Chandra, P.1    Chess, B.2    Steven, J.3
  • 7
    • 10944267118 scopus 로고    scopus 로고
    • Static analysis for security
    • B. Chess and G. McGraw, "Static analysis for security," IEEE Security and Privacy, vol.2, no.6, pp. 76-79, 2004.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.6 , pp. 76-79
    • Chess, B.1    McGraw, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.