메뉴 건너뛰기




Volumn , Issue , 2005, Pages 174-183

AMNESIA: Analysis and monitoring for NEutralizing SQL-injection attacks

Author keywords

Runtime monitoring; SQL injection; Static analysis

Indexed keywords

CODE INJECTION ATTACKS; FALSE POSITIVE; INPUT STRING; MODEL BASED APPROACH; PROGRAM ANALYSIS; RUNTIME MONITORING; SQL INJECTION; WEB APPLICATION;

EID: 77952407110     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1101908.1101935     Document Type: Conference Paper
Times cited : (419)

References (26)
  • 1
    • 0011378202 scopus 로고    scopus 로고
    • C. Anley Advanced SQL Injection In SQL Server Applications. Next Generation Security Software Ltd
    • C. Anley Advanced SQL Injection In SQL Server Applications. Next Generation Security Software Ltd. White Paper, 2002.
    • (2002) White Paper
  • 11
    • 0010729284 scopus 로고    scopus 로고
    • Microsoft Press, Redmond, Washington, 2nd edition
    • M. Howard and D. LeBlanc. Writing Secure Code. Microsoft Press, Redmond, Washington, 2nd edition, 2003.
    • (2003) Writing Secure Code
    • Howard, M.1    Leblanc, D.2
  • 15
    • 84923564816 scopus 로고    scopus 로고
    • Finding security vulnerabilities in Java applications with static analysis
    • Aug
    • V. B. Livshits and M. S. Lam. Finding Security Vulnerabilities in Java Applications with Static Analysis In Usenix Security Symposium, Aug. 2005.
    • (2005) Usenix Security Symposium
    • Livshits, V.B.1    Lam, M.S.2
  • 16
    • 33745635923 scopus 로고    scopus 로고
    • SQL injection signatures evasion
    • April
    • O. Maor and A. Shulman. SQL Injection Signatures Evasion. http://www.imperva.com/application defense center/white papers/sql injection signatures evasion.html, April 2004. White paper.
    • (2004) White Paper
    • Maor, O.1    Shulman, A.2
  • 19
    • 77952335397 scopus 로고    scopus 로고
    • SQL injection: Modes of attack, defense, and why it matters
    • April
    • S. McDonald. SQL Injection: Modes of attack, defense, and why it matters. http://www.governmentsecurity.org/articles/ SQLInjectionModesofAttackDefenceandWhyItMatters.php, April 2004. White paper.
    • (2004) White Paper
    • McDonald, S.1
  • 21
    • 33750098293 scopus 로고    scopus 로고
    • OWASPD - Open Web Application Security Project
    • OWASPD - Open Web Application Security Project. Top ten most critical web application vulnerabilities. http://www.owasp.org/documentation/topten.html, 2005.
    • (2005) Top Ten Most Critical Web Application Vulnerabilities
  • 24
    • 0011378202 scopus 로고    scopus 로고
    • SecuriTeam. SQL Injection Walkthrough, May
    • SecuriTeam. SQL Injection Walkthrough. http://www.securiteam.com/ securityreviews/5DP0N1P76E.html, May 2002. White paper.
    • (2002) White Paper


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.