메뉴 건너뛰기




Volumn , Issue , 2013, Pages 1181-1191

Diglossia: Detecting code injection attacks with precision and efficiency

Author keywords

code injection; dynamic analysis; nosql injection; sql injection; taint tracking; web application security

Indexed keywords

CODE INJECTION; CODE INJECTION ATTACKS; DESIGN AND IMPLEMENTATIONS; EXECUTABLE PROGRAMS; SQL INJECTION; SQL INJECTION ATTACKS; TECHNICAL INNOVATION; WEB APPLICATION SECURITY;

EID: 84889055562     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2508859.2516696     Document Type: Conference Paper
Times cited : (65)

References (26)
  • 1
    • 49949109144 scopus 로고    scopus 로고
    • CANDID: Preventing SQL injection attacks using dynamic candidate evaluations
    • S. Bandhakavi, P. Bisht, P. Madhusudan, and V. N. Venkatakrishnan. CANDID: Preventing SQL injection attacks using dynamic candidate evaluations. In CCS, 2007.
    • (2007) CCS
    • Bandhakavi, S.1    Bisht, P.2    Madhusudan, P.3    Venkatakrishnan, V.N.4
  • 2
    • 16644366310 scopus 로고    scopus 로고
    • SQLrand: Preventing SQL injection attacks
    • S. Boyd and A. Keromytis. SQLrand: Preventing SQL injection attacks. In ACNS, 2004.
    • (2004) ACNS
    • Boyd, S.1    Keromytis, A.2
  • 3
    • 85007509865 scopus 로고    scopus 로고
    • Efficient character-level taint tracking for Java
    • E. Chin and D. Wagner. Efficient character-level taint tracking for Java. In SWS, 2009.
    • (2009) SWS
    • Chin, E.1    Wagner, D.2
  • 4
    • 84889006863 scopus 로고    scopus 로고
    • CVE Details. http://www.cvedetails.com/vulnerabilities-by-types.php.
  • 5
    • 34547379435 scopus 로고    scopus 로고
    • Using positive tainting and syntax-aware evaluation to counter SQL injection attacks
    • W. Halfond, A. Orso, and P. Manolios. Using positive tainting and syntax-aware evaluation to counter SQL injection attacks. In FSE, 2006.
    • (2006) FSE
    • Halfond, W.1    Orso, A.2    Manolios, P.3
  • 6
    • 33751027156 scopus 로고    scopus 로고
    • Pixy: A static analysis tool for detecting Web application vulnerabilities
    • N. Jovanovic, C. Kruegel, and E. Kirda. Pixy: A static analysis tool for detecting Web application vulnerabilities. In S&P, 2006.
    • (2006) S&P
    • Jovanovic, N.1    Kruegel, C.2    Kirda, E.3
  • 7
    • 77949879017 scopus 로고    scopus 로고
    • Automatic creation of SQL injection and cross-site scripting attacks
    • A. Kieżun, P. Guo, K. Jayaraman, and M. Ernst. Automatic creation of SQL injection and cross-site scripting attacks. In ICSE, 2009.
    • (2009) ICSE
    • Kiezun, A.1    Guo, P.2    Jayaraman, K.3    Ernst, M.4
  • 8
    • 72949084588 scopus 로고    scopus 로고
    • SQLProb: A proxy-based architecture towards preventing SQL injection attacks
    • A. Liu, Y. Yuan, D. Wijesekera, and A. Stavrou. SQLProb: A proxy-based architecture towards preventing SQL injection attacks. In SAC, 2009.
    • (2009) SAC
    • Liu, A.1    Yuan, Y.2    Wijesekera, D.3    Stavrou, A.4
  • 9
    • 84923564816 scopus 로고    scopus 로고
    • Finding security vulnerabilities in Java applications with static analysis
    • V. Livshits and M. Lam. Finding security vulnerabilities in Java applications with static analysis. In USENIX Security, 2005.
    • (2005) USENIX Security
    • Livshits, V.1    Lam, M.2
  • 11
    • 84888991243 scopus 로고    scopus 로고
    • Preventing web application injections with complementary character coding
    • R. Mui and P. Frankl. Preventing web application injections with complementary character coding. In ESORICS, 2011.
    • (2011) ESORICS
    • Mui, R.1    Frankl, P.2
  • 13
    • 31744433386 scopus 로고    scopus 로고
    • Automatically hardening Web applications using precise tainting
    • A. Nguyen-Tuong, S. Guarnieri, D. Greene, and D. Evans. Automatically hardening Web applications using precise tainting. In SEC, 2005.
    • (2005) SEC
    • Nguyen-Tuong, A.1    Guarnieri, S.2    Greene, D.3    Evans, D.4
  • 14
    • 84888998968 scopus 로고    scopus 로고
    • NoSQL. http://nosql-database.org/.
  • 15
  • 16
    • 33745213901 scopus 로고    scopus 로고
    • Defending against injection attacks through context-sensitive string evaluation
    • T. Pietraszek and C. Berghe. Defending against injection attacks through context-sensitive string evaluation. In RAID, 2006.
    • (2006) RAID
    • Pietraszek, T.1    Berghe, C.2
  • 17
    • 84857807425 scopus 로고    scopus 로고
    • Defining code-injection attacks
    • D. Ray and J. Ligatti. Defining code-injection attacks. In POPL, 2012.
    • (2012) POPL
    • Ray, D.1    Ligatti, J.2
  • 18
    • 80053015448 scopus 로고    scopus 로고
    • An efficient black-box technique for defeating Web application attacks
    • R. Sekar. An efficient black-box technique for defeating Web application attacks. In NDSS, 2009.
    • (2009) NDSS
    • Sekar, R.1
  • 19
    • 84860306633 scopus 로고    scopus 로고
    • SAFERPHP: Finding semantic vulnerabilities in PHP applications
    • S. Son and V. Shmatikov. SAFERPHP: Finding semantic vulnerabilities in PHP applications. In PLAS, 2011.
    • (2011) PLAS
    • Son, S.1    Shmatikov, V.2
  • 20
    • 33745811685 scopus 로고    scopus 로고
    • The essence of command injection attacks in Web applications
    • Z. Su and G. Wassermann. The essence of command injection attacks in Web applications. In POPL, 2006.
    • (2006) POPL
    • Su, Z.1    Wassermann, G.2
  • 24
    • 35449004893 scopus 로고    scopus 로고
    • Sound and precise analysis of Web applications for injection vulnerabilities
    • G. Wassermann and Z. Su. Sound and precise analysis of Web applications for injection vulnerabilities. In PLDI, 2007.
    • (2007) PLDI
    • Wassermann, G.1    Su, Z.2
  • 26
    • 85038810709 scopus 로고    scopus 로고
    • Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
    • W. Xu, S. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. In USENIX Security, 2006.
    • (2006) USENIX Security
    • Xu, W.1    Bhatkar, S.2    Sekar, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.