메뉴 건너뛰기




Volumn , Issue , 2012, Pages 179-190

Defining code-injection attacks

Author keywords

Algorithms; Languages; Security

Indexed keywords

CODE INJECTION ATTACKS; SECURITY;

EID: 84857807425     PISSN: 07308566     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2103656.2103678     Document Type: Conference Paper
Times cited : (12)

References (40)
  • 3
    • 77949464016 scopus 로고    scopus 로고
    • CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks
    • Feb
    • P. Bisht, P. Madhusudan, and V. N. Venkatakrishnan. CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks. ACM Trans. Inf. Syst. Secur., 13(2):1-39, Feb. 2010.
    • (2010) ACM Trans. Inf. Syst. Secur. , vol.13 , Issue.2 , pp. 1-39
    • Bisht, P.1    Madhusudan, P.2    Venkatakrishnan, V.N.3
  • 4
  • 6
    • 34548212308 scopus 로고    scopus 로고
    • Dytan: A generic dynamic taint analysis framework
    • DOI 10.1145/1273463.1273490, Proceedings of the 2007 ACM International Symposium on Software Testing and Analysis, ISSTA'07
    • J. Clause,W. Li, and A. Orso. Dytan: a generic dynamic taint analysis framework. In Proceedings of the ACM International Symposium on Software Testing and Analysis, pages 196-206, 2007. (Pubitemid 47317593)
    • (2007) 2007 ACM International Symposium on Software Testing and Analysis, ISSTA'07 , pp. 196-206
    • Clause, J.1    Li, W.2    Orso, A.3
  • 8
    • 40449091840 scopus 로고    scopus 로고
    • WASP: Protecting web applications using positive tainting and syntax-aware evaluation
    • DOI 10.1109/TSE.2007.70748
    • W. Halfond, A. Orso, and P. Manolios. Wasp: Protecting web applications using positive tainting and syntax-aware evaluation. IEEE Trans. Softw. Eng., 34(1):65-81, 2008. (Pubitemid 351343903)
    • (2008) IEEE Transactions on Software Engineering , vol.34 , Issue.1 , pp. 65-81
    • Halfond, W.G.J.1    Orso, A.2    Manolios, P.3
  • 12
    • 33751027156 scopus 로고    scopus 로고
    • Pixy: A static analysis tool for detecting web application vulnerabilities (Short paper)
    • DOI 10.1109/SP.2006.29, 1624016, Proceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006
    • N. Jovanovic, C. Kruegel, and E. Kirda. Pixy: A static analysis tool for detecting web application vulnerabilities (short paper). In Proceedings of the IEEE Symposium on Security and Privacy, pages 258-263, 2006. (Pubitemid 44753727)
    • (2006) Proceedings - IEEE Symposium on Security and Privacy , vol.2006 , pp. 258-263
    • Jovanovic, N.1    Kruegel, C.2    Kirda, E.3
  • 15
    • 0001621268 scopus 로고
    • On the translation of languages from left to right
    • D. E. Knuth. On the translation of languages from left to right. Information and Control, 8(6):607-639, 1965.
    • (1965) Information and Control , vol.8 , Issue.6 , pp. 607-639
    • Knuth, D.E.1
  • 16
    • 0001097061 scopus 로고
    • The mechanical evaluation of expressions
    • P. J. Landin. The mechanical evaluation of expressions. Computer Journal, 6(4):308-320, 1963.
    • (1963) Computer Journal , vol.6 , Issue.4 , pp. 308-320
    • Landin, P.J.1
  • 18
    • 84857181499 scopus 로고    scopus 로고
    • Microsoft. SQL Minimum Grammar, 2011. http://msdn.microsoft.com/en-us/ library/ms711725(VS.85).aspx.
    • (2011) SQL Minimum Grammar
  • 19
    • 84857166285 scopus 로고    scopus 로고
    • Microsoft. CREATE FUNCTION (Transact-SQL), 2011. http://msdn.microsoft. com/en-us/library/ms186755.aspx.
    • (2011) CREATE FUNCTION (Transact-SQL)
  • 20
    • 84857170440 scopus 로고    scopus 로고
    • The MITRE Corporation. Document version 1.4
    • CWE/SANS Top 25 Most Dangerous Software Errors. The MITRE Corporation, 2009. Document version 1.4, http://cwe.mitre.org/top25/archive/2009/2009-cwe- sans-top-25.pdf.
    • (2009) CWE/SANS Top 25 Most Dangerous Software Errors
  • 21
    • 84864234149 scopus 로고    scopus 로고
    • The MITRE Corporation. Document version 1.08
    • CWE/SANS Top 25 Most Dangerous Software Errors. The MITRE Corporation, 2010. Document version 1.08, http://cwe.mitre.org/top25/archive/2010/2010-cwe- sans-top25.pdf.
    • (2010) CWE/SANS Top 25 Most Dangerous Software Errors
  • 22
    • 84857169522 scopus 로고    scopus 로고
    • The MITRE Corporation. Document version 1.0.2
    • CWE/SANS Top 25 Most Dangerous Software Errors. The MITRE Corporation, 2011. Document version 1.0.2, http://cwe.mitre.org/top25/archive/2011/2011-cwe- sans-top25.pdf.
    • (2011) CWE/SANS Top 25 Most Dangerous Software Errors
  • 24
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • Feb
    • J. Newsome and D. X. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proceedings of the Network and Distributed System Security Symposium, Feb. 2005.
    • (2005) Proceedings of the Network and Distributed System Security Symposium
    • Newsome, J.1    Song, D.X.2
  • 27
    • 84857173560 scopus 로고    scopus 로고
    • An Oracle White Paper, December. Page 11
    • Oracle. How to write injection-proof PL/SQL. An Oracle White Paper, December 2008. URL http://www.oracle.com/technetwork/database/features/plsql/ overview/how-to-write-injection-proof-plsql-1-129572.pdf. Page 11.
    • (2008) How to Write Injection-proof PL/SQL
  • 29
    • 84857160572 scopus 로고    scopus 로고
    • Oracle. CREATE FUNCTION, 2011. http://download.oracle.com/docs/cd/E11882- 01/server.112/e17118/statements-5011.htm.
    • (2011) Create Function
  • 32
    • 18944377121 scopus 로고
    • Call-by-name call-by-value and the λ-calculus
    • G. D. Plotkin. Call-by-name, call-by-value and the λ-calculus. Theoretical Computer Science, 1(2):125-159, 1975.
    • (1975) Theoretical Computer Science , vol.1 , Issue.2 , pp. 125-159
    • Plotkin, G.D.1
  • 33
    • 77955182005 scopus 로고    scopus 로고
    • All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask
    • May
    • E. J. Schwartz, T. Avgerinos, and D. Brumley. All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask). In Proceedings of the IEEE Symposium on Security and Privacy, May 2010.
    • (2010) Proceedings of the IEEE Symposium on Security and Privacy
    • Schwartz, E.J.1    Avgerinos, T.2    Brumley, D.3
  • 36
    • 84857851939 scopus 로고    scopus 로고
    • The art of war
    • Translated by Lionel Giles
    • S. Tzu. The art of war. The Project Gutenberg eBook. Translated by Lionel Giles. http://www.gutenberg.org/cache/epub/17405/pg17405.txt.
    • The Project Gutenberg EBook
    • Tzu, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.