-
1
-
-
82755168037
-
-
The Open Web Application Security Project, OWASP TOP 10 Project.
-
The Open Web Application Security Project, OWASP TOP 10 Project. http://www.owasp.org/.
-
-
-
-
2
-
-
82755168035
-
-
Apache Struts Project, Struts.
-
Apache Struts Project, Struts. http://struts.apache.org/.
-
-
-
-
3
-
-
82755194351
-
-
PHP, magic quotes.
-
PHP, magic quotes. http://www.php.net/magic_quotes/.
-
-
-
-
4
-
-
4544287108
-
-
JDBC checker: a static analysis tool for SQL/JDBC applications, in: Proceedings of the 26th International Conference on Software Engineering, ICSE, 2004, pp. 697-698.
-
C. Gould, Z. Su, P. Devanbu, JDBC checker: a static analysis tool for SQL/JDBC applications, in: Proceedings of the 26th International Conference on Software Engineering, ICSE, 2004, pp. 697-698.
-
-
-
Gould, C.1
Su, Z.2
Devanbu, P.3
-
5
-
-
19944365247
-
-
Securing web application code by static analysis and runtime protection, in: Proceedings of the 12th International World Wide Web Conference ACM, 2004, pp. 40-52.
-
Y. Huang, F. Yu, C. Hang, C.H. Tsai, D.T. Lee, S.Y. Kuo, Securing web application code by static analysis and runtime protection, in: Proceedings of the 12th International World Wide Web Conference ACM, 2004, pp. 40-52.
-
-
-
Huang, Y.1
Yu, F.2
Hang, C.3
Tsai, C.H.4
Lee, D.T.5
Kuo, S.Y.6
-
6
-
-
82755178036
-
-
Finding security errors in Java programs with static analysis, in: Proceedings of the 14th Usenix Security Symposium
-
V.B. Livshits, M.S. Lam, Finding security errors in Java programs with static analysis, in: Proceedings of the 14th Usenix Security Symposium, 2005, pp. 271-286.
-
(2005)
, pp. 271-286
-
-
Livshits, V.B.1
Lam, M.S.2
-
8
-
-
33745201748
-
-
An analysis framework for security in web applications, in: Proceedings of the FSE Workshop on Specification and Verification of Component-Based Systems, SAVCBS
-
G. Wassermann, Z. Su, An analysis framework for security in web applications, in: Proceedings of the FSE Workshop on Specification and Verification of Component-Based Systems, SAVCBS, 2004, pp. 70-78.
-
(2004)
, pp. 70-78
-
-
Wassermann, G.1
Su, Z.2
-
9
-
-
48649100112
-
-
Sania: syntactic and semantic analysis for automated testing against SQL injection, in: Proceedings of the Computer Security Applications Conference 2007
-
Y. Kosuga, K. Kernel, M. Hanaoka, M. Hishiyama, Y. Takahama, Sania: syntactic and semantic analysis for automated testing against SQL injection, in: Proceedings of the Computer Security Applications Conference 2007, 2007, pp. 107-117.
-
(2007)
, pp. 107-117
-
-
Kosuga, Y.1
Kernel, K.2
Hanaoka, M.3
Hishiyama, M.4
Takahama, Y.5
-
10
-
-
82755168036
-
-
Paros. Parosproxy.org.
-
Paros. Parosproxy.org. http://www.parosproxy.org/.
-
-
-
-
11
-
-
82755195338
-
-
Improving the identification of actual input manipulation vulnerabilities, in: 14th ACM SIGSOFT Symposium on Foundations of Software Engineering ACM
-
Y. Shin, Improving the identification of actual input manipulation vulnerabilities, in: 14th ACM SIGSOFT Symposium on Foundations of Software Engineering ACM, 2006.
-
(2006)
-
-
Shin, Y.1
-
12
-
-
77953855187
-
-
Sivilotti, Using parse tree validation to prevent SQL injection attacks, in: Proceedings of the 5th International Workshop on Software Engineering and Middleware
-
G. Buehrer, B.W. Weide, P.A. Sivilotti, Using parse tree validation to prevent SQL injection attacks, in: Proceedings of the 5th International Workshop on Software Engineering and Middleware, 2005, pp. 105-113.
-
(2005)
, pp. 105-113
-
-
Buehrer, G.1
Weide, B.W.2
Sivilotti, P.A.3
-
13
-
-
77953855187
-
-
Using parse tree validation to prevent SQL injection attacks, in: Proceeding of the 5th International Workshop on Software Engineering and Middleware ACM
-
G. Buehrer, B.W. Weide, P.A.G. Sivilotti, Using parse tree validation to prevent SQL injection attacks, in: Proceeding of the 5th International Workshop on Software Engineering and Middleware ACM, 2005, pp. 106-113.
-
(2005)
, pp. 106-113
-
-
Buehrer, G.1
Weide, B.W.2
Sivilotti, P.A.G.3
-
14
-
-
77952407110
-
-
AMNESIA: analysis and monitoring for neutralizing SQL-injection attacks, in: Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering
-
W.G. Halfond, A. Orso, AMNESIA: analysis and monitoring for neutralizing SQL-injection attacks, in: Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering, 2005, pp. 174-183.
-
(2005)
, pp. 174-183
-
-
Halfond, W.G.1
Orso, A.2
-
15
-
-
33745811685
-
The essence of command injection attacks in web applications
-
in: Conference Record of the 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
-
Z. Su, G. Wassermann, The essence of command injection attacks in web applications, in: Conference Record of the 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2006, pp. 372-382.
-
(2006)
, pp. 372-382
-
-
Su, Z.1
Wassermann, G.2
-
16
-
-
79960266079
-
Preventing SQL injection attacks in stored procedures
-
in: Software Engineering Conference. Australian, 2006,
-
K. Wei, M. Muthuprasanna, S. Kothari, Preventing SQL injection attacks in stored procedures, in: Software Engineering Conference 2006. Australian, 2006, pp. 18-21.
-
(2006)
, pp. 18-21
-
-
Wei, K.1
Muthuprasanna, M.2
Kothari, S.3
-
17
-
-
84880450431
-
Web application security assessment by fault injection and behavior monitoring
-
in: Proceedings of the 12th International Conference on World Wide Web
-
Y. Huang, S. Huang, T. Lin, C. Tasi, Web application security assessment by fault injection and behavior monitoring, in: Proceedings of the 12th International Conference on World Wide Web, 2003, pp. 148-159.
-
(2003)
, pp. 148-159
-
-
Huang, Y.1
Huang, S.2
Lin, T.3
Tasi, C.4
-
18
-
-
26444575798
-
A learning-based approach to the detection of SQL attacks
-
in: Proceedings of the Conference on Detection of Intrusions and Malware and Vulnerability Assessment
-
F. Valeur, D. Mutz, G. Vigna, A learning-based approach to the detection of SQL attacks, in: Proceedings of the Conference on Detection of Intrusions and Malware and Vulnerability Assessment, 2005, pp 123-140.
-
(2005)
, pp. 123-140
-
-
Valeur, F.1
Mutz, D.2
Vigna, G.3
-
20
-
-
35048851186
-
SQLrand: preventing SQL injection attacks
-
Applied Cryptography and Network Security
-
Boyd S., Keromytis A. SQLrand: preventing SQL injection attacks. LNCS 2004, vol. 3089:292-302.
-
(2004)
LNCS
, vol.3089
, pp. 292-302
-
-
Boyd, S.1
Keromytis, A.2
-
21
-
-
38049147942
-
SQL injection attack detection: profiling of web application parameter using the sequence pairwise alignment
-
Information Security Applications
-
Park J., Noh B. SQL injection attack detection: profiling of web application parameter using the sequence pairwise alignment. LNCS 2007, vol. 4298:74-82.
-
(2007)
LNCS
, vol.4298
, pp. 74-82
-
-
Park, J.1
Noh, B.2
-
22
-
-
82755168033
-
-
GotoCode.
-
GotoCode. http://www.gotocode.com/.
-
-
-
-
23
-
-
34547241372
-
A classification of SQL-injection attacks and countermeasures
-
in: Proceeding on International Symposium on Secure Software Engineering, Raleigh, NC, USA
-
W.G. Halfond, J. Viegas, A. Orso, A classification of SQL-injection attacks and countermeasures, in: Proceeding on International Symposium on Secure Software Engineering, Raleigh, NC, USA, 2006, pp. 65-81.
-
(2006)
, pp. 65-81
-
-
Halfond, W.G.1
Viegas, J.2
Orso, A.3
-
24
-
-
33745661661
-
Defending against injection attacks through context-sensitive string evaluation
-
Proceeding of Recent Advances in Intrusion Detection
-
Pietraszek T.C., Berghe V. Defending against injection attacks through context-sensitive string evaluation. LNCS 2006, vol. 3858:124-145.
-
(2006)
LNCS
, vol.3858
, pp. 124-145
-
-
Pietraszek, T.C.1
Berghe, V.2
-
25
-
-
33846310068
-
Franz
-
in: Proceedings 21st Annual Computer Security Applications Conference
-
V. Haldar, D. Chandra, Franz, Dynamic Taint propagation for Java, in: Proceedings 21st Annual Computer Security Applications Conference, 2005, pp. 303-311.
-
(2005)
Dynamic Taint propagation for Java
, pp. 303-311
-
-
Haldar, V.1
Chandra, D.2
-
26
-
-
84871349041
-
Automatically hardening web application using precise tainting information
-
Twentieth IFIP Iternational Information Security Conference
-
Nguyen-Tuong A., Guarnieri S., Greene D., Shirley J., Evans D. Automatically hardening web application using precise tainting information. LNCS 2005, vol. 181:295-307.
-
(2005)
LNCS
, vol.181
, pp. 295-307
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Shirley, J.4
Evans, D.5
-
27
-
-
31344435513
-
Safe query objects
-
in: Proceedings of the 27th International Conference on Software Engineering
-
W.R. Cook, S. Rai, Safe query objects: statically typed objects as remotely executable queries, in: Proceedings of the 27th International Conference on Software Engineering, 2005, pp. 97-106.
-
(2005)
statically typed objects as remotely executable queries
, pp. 97-106
-
-
Cook, W.R.1
Rai, S.2
-
28
-
-
77953069969
-
Abstracting application-level web security
-
in: Proceedings of the 11th International Conference on the World Wide Web
-
D. Scott, R. Sharp, Abstracting application-level web security, in: Proceedings of the 11th International Conference on the World Wide Web, 2002, pp. 396-407.
-
(2002)
, pp. 396-407
-
-
Scott, D.1
Sharp, R.2
-
29
-
-
31744432699
-
Finding application errors and security flaws using PQL
-
in: Proceedings of the 20th Annual ACM SIGPLAN Conference on Object Oriented Programming Systems Languages and Applications
-
M. Martin, B. Livshits, M.S. Lam, Finding application errors and security flaws using PQL: a program query language, in: Proceedings of the 20th Annual ACM SIGPLAN Conference on Object Oriented Programming Systems Languages and Applications, 2005, pp. 365-383.
-
(2005)
A program query language
, pp. 365-383
-
-
Martin, M.1
Livshits, B.2
Lam, M.S.3
-
30
-
-
33244471315
-
SQL DOM
-
in: Proceedings of the 27th International Conference on Software Engineering
-
R. McClure, I. Krüger, SQL DOM: compile time checking of dynamic SQL statements, in: Proceedings of the 27th International Conference on Software Engineering, 2005, pp. 88-96.
-
(2005)
compile time checking of dynamic SQL statements
, pp. 88-96
-
-
McClure, R.1
Krüger, I.2
|