-
2
-
-
16644366310
-
SQLrand: Preventing SQL injection attacks
-
S. Boyd and A. Keromytis. SQLrand: Preventing SQL injection attacks. In ACNS, 2004.
-
(2004)
ACNS
-
-
Boyd, S.1
Keromytis, A.2
-
3
-
-
85007509865
-
Efficient character-level taint tracking for Java
-
E. Chin and D. Wagner. Efficient character-level taint tracking for Java. In SWS, 2009.
-
(2009)
SWS
-
-
Chin, E.1
Wagner, D.2
-
4
-
-
84889006863
-
-
CVE Details. http://www.cvedetails.com/vulnerabilities-by-types.php.
-
-
-
-
5
-
-
34547379435
-
Using positive tainting and syntax-aware evaluation to counter SQL injection attacks
-
W. Halfond, A. Orso, and P. Manolios. Using positive tainting and syntax-aware evaluation to counter SQL injection attacks. In FSE, 2006.
-
(2006)
FSE
-
-
Halfond, W.1
Orso, A.2
Manolios, P.3
-
6
-
-
33751027156
-
Pixy: A static analysis tool for detecting Web application vulnerabilities
-
N. Jovanovic, C. Kruegel, and E. Kirda. Pixy: A static analysis tool for detecting Web application vulnerabilities. In S&P, 2006.
-
(2006)
S&P
-
-
Jovanovic, N.1
Kruegel, C.2
Kirda, E.3
-
7
-
-
77949879017
-
Automatic creation of SQL injection and cross-site scripting attacks
-
A. Kieżun, P. Guo, K. Jayaraman, and M. Ernst. Automatic creation of SQL injection and cross-site scripting attacks. In ICSE, 2009.
-
(2009)
ICSE
-
-
Kiezun, A.1
Guo, P.2
Jayaraman, K.3
Ernst, M.4
-
8
-
-
72949084588
-
SQLProb: A proxy-based architecture towards preventing SQL injection attacks
-
A. Liu, Y. Yuan, D. Wijesekera, and A. Stavrou. SQLProb: A proxy-based architecture towards preventing SQL injection attacks. In SAC, 2009.
-
(2009)
SAC
-
-
Liu, A.1
Yuan, Y.2
Wijesekera, D.3
Stavrou, A.4
-
9
-
-
84923564816
-
Finding security vulnerabilities in Java applications with static analysis
-
V. Livshits and M. Lam. Finding security vulnerabilities in Java applications with static analysis. In USENIX Security, 2005.
-
(2005)
USENIX Security
-
-
Livshits, V.1
Lam, M.2
-
11
-
-
84888991243
-
Preventing web application injections with complementary character coding
-
R. Mui and P. Frankl. Preventing web application injections with complementary character coding. In ESORICS, 2011.
-
(2011)
ESORICS
-
-
Mui, R.1
Frankl, P.2
-
13
-
-
31744433386
-
Automatically hardening Web applications using precise tainting
-
A. Nguyen-Tuong, S. Guarnieri, D. Greene, and D. Evans. Automatically hardening Web applications using precise tainting. In SEC, 2005.
-
(2005)
SEC
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Evans, D.4
-
14
-
-
84888998968
-
-
NoSQL. http://nosql-database.org/.
-
-
-
-
15
-
-
84889004969
-
-
NoSQL injection attack on Diaspora. http://www.kalzumeus.com/2010/09/22/ security-lessons-learned-from-the-diaspora-launch/.
-
NoSQL Injection Attack on Diaspora
-
-
-
16
-
-
33745213901
-
Defending against injection attacks through context-sensitive string evaluation
-
T. Pietraszek and C. Berghe. Defending against injection attacks through context-sensitive string evaluation. In RAID, 2006.
-
(2006)
RAID
-
-
Pietraszek, T.1
Berghe, C.2
-
17
-
-
84857807425
-
Defining code-injection attacks
-
D. Ray and J. Ligatti. Defining code-injection attacks. In POPL, 2012.
-
(2012)
POPL
-
-
Ray, D.1
Ligatti, J.2
-
18
-
-
80053015448
-
An efficient black-box technique for defeating Web application attacks
-
R. Sekar. An efficient black-box technique for defeating Web application attacks. In NDSS, 2009.
-
(2009)
NDSS
-
-
Sekar, R.1
-
19
-
-
84860306633
-
SAFERPHP: Finding semantic vulnerabilities in PHP applications
-
S. Son and V. Shmatikov. SAFERPHP: Finding semantic vulnerabilities in PHP applications. In PLAS, 2011.
-
(2011)
PLAS
-
-
Son, S.1
Shmatikov, V.2
-
20
-
-
33745811685
-
The essence of command injection attacks in Web applications
-
Z. Su and G. Wassermann. The essence of command injection attacks in Web applications. In POPL, 2006.
-
(2006)
POPL
-
-
Su, Z.1
Wassermann, G.2
-
24
-
-
35449004893
-
Sound and precise analysis of Web applications for injection vulnerabilities
-
G. Wassermann and Z. Su. Sound and precise analysis of Web applications for injection vulnerabilities. In PLDI, 2007.
-
(2007)
PLDI
-
-
Wassermann, G.1
Su, Z.2
-
26
-
-
85038810709
-
Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
-
W. Xu, S. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. In USENIX Security, 2006.
-
(2006)
USENIX Security
-
-
Xu, W.1
Bhatkar, S.2
Sekar, R.3
|