-
1
-
-
0011378202
-
-
C. Anley Advanced SQL Injection In SQL Server Applications. Next Generation Security Software Ltd
-
C. Anley Advanced SQL Injection In SQL Server Applications. Next Generation Security Software Ltd. White Paper, 2002.
-
(2002)
White Paper
-
-
-
5
-
-
35248891044
-
Precise analysis of string expressions
-
of LNCS, Springer-Verlag, June
-
A. S. Christensen, A. Møller, and M. I. Schwartzbach. Precise Analysis of String Expressions. In Proceedings of the 10th International Static Analysis Symposium, SAS 03, volume 2694 of LNCS, pages 1-18. Springer-Verlag, June 2003.
-
(2003)
Proceedings of the 10th International Static Analysis Symposium, SAS 03
, vol.2694
, pp. 1-18
-
-
Christensen, A.S.1
Møller, A.2
Schwartzbach, M.I.3
-
11
-
-
0010729284
-
-
Microsoft Press, Redmond, Washington, 2nd edition
-
M. Howard and D. LeBlanc. Writing Secure Code. Microsoft Press, Redmond, Washington, 2nd edition, 2003.
-
(2003)
Writing Secure Code
-
-
Howard, M.1
Leblanc, D.2
-
13
-
-
19944365247
-
Securing web application code by static analysis and runtime protection
-
May
-
Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D. T. Lee, and S.-Y. Kuo. Securing Web Application Code by Static Analysis and Runtime Protection. In Proceedings of the 12th International World Wide Web Conference (WWW 2004), May 2004.
-
(2004)
Proceedings of the 12th International World Wide Web Conference (WWW 2004)
-
-
Huang, Y.-W.1
Yu, F.C.H.2
Tsai, C.-H.3
Lee, D.T.4
Kuo, S.-Y.5
-
15
-
-
84923564816
-
Finding security vulnerabilities in Java applications with static analysis
-
Aug
-
V. B. Livshits and M. S. Lam. Finding Security Vulnerabilities in Java Applications with Static Analysis In Usenix Security Symposium, Aug. 2005.
-
(2005)
Usenix Security Symposium
-
-
Livshits, V.B.1
Lam, M.S.2
-
16
-
-
33745635923
-
SQL injection signatures evasion
-
April
-
O. Maor and A. Shulman. SQL Injection Signatures Evasion. http://www.imperva.com/application defense center/white papers/sql injection signatures evasion.html, April 2004. White paper.
-
(2004)
White Paper
-
-
Maor, O.1
Shulman, A.2
-
17
-
-
31744432699
-
Finding application errors using PQL: A program query language
-
Oct
-
M. Martin, V. B. Livshits, and M. S. Lam. Finding application errors using PQL: a program query language. In Proceedings of the ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA), Oct. 2005.
-
(2005)
Proceedings of the ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA)
-
-
Martin, M.1
Livshits, V.B.2
Lam, M.S.3
-
19
-
-
77952335397
-
SQL injection: Modes of attack, defense, and why it matters
-
April
-
S. McDonald. SQL Injection: Modes of attack, defense, and why it matters. http://www.governmentsecurity.org/articles/ SQLInjectionModesofAttackDefenceandWhyItMatters.php, April 2004. White paper.
-
(2004)
White Paper
-
-
McDonald, S.1
-
20
-
-
84871349041
-
Automatically hardening web applications using precise tainting information
-
May
-
Anh Nguyen-Tuong, Salvatore Guarnieri, Doug Greene, Jeff Shirley, David Evans. Automatically Hardening Web Applications Using Precise Tainting Information In Twentieth IFIP International Information Security Conference (SEC 2005), May 2005.
-
(2005)
Twentieth IFIP International Information Security Conference (SEC 2005)
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Shirley, J.4
Evans, D.5
-
21
-
-
33750098293
-
-
OWASPD - Open Web Application Security Project
-
OWASPD - Open Web Application Security Project. Top ten most critical web application vulnerabilities. http://www.owasp.org/documentation/topten.html, 2005.
-
(2005)
Top Ten Most Critical Web Application Vulnerabilities
-
-
-
24
-
-
0011378202
-
-
SecuriTeam. SQL Injection Walkthrough, May
-
SecuriTeam. SQL Injection Walkthrough. http://www.securiteam.com/ securityreviews/5DP0N1P76E.html, May 2002. White paper.
-
(2002)
White Paper
-
-
|