메뉴 건너뛰기




Volumn , Issue , 2013, Pages 248-264

Web malware that targets web applications

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; ELECTRONIC COMMERCE; GOVERNMENT DATA PROCESSING; INTRUSION DETECTION; NETWORK SECURITY; QUERY LANGUAGES; WEBSITES;

EID: 84893435715     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-4666-3926-3.ch012     Document Type: Chapter
Times cited : (9)

References (34)
  • 1
    • 77749335741 scopus 로고    scopus 로고
    • Information security economics-And beyond
    • Anderson, R., & Moore, T. (2007). Information security economics-And beyond. Advances in Cryptology-CRYPTO, 2007, 68-91.
    • (2007) Advances in Cryptology-CRYPTO , vol.2007 , pp. 68-91
    • Anderson, R.1    Moore, T.2
  • 5
    • 77949464016 scopus 로고    scopus 로고
    • CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks
    • Bisht, P., Madhusudan, P., & Venkatakrishnan, V. (2010). CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks. ACM Transactions on Information and System Security, 13(2), 1-39. doi:10.1145/1698750.1698754.
    • (2010) ACM Transactions on Information and System Security , vol.13 , Issue.2 , pp. 1-39
    • Bisht, P.1    Madhusudan, P.2    Venkatakrishnan, V.3
  • 7
    • 0013347631 scopus 로고    scopus 로고
    • Common vulnerabilities and exposures
    • Retrieved April, 2011
    • Corporation, M. (2010). Common vulnerabilities and exposures. Retrieved April, 2011, from http://cve.mitre.org/.
    • (2010)
    • Corporation, M.1
  • 14
    • 77955088380 scopus 로고    scopus 로고
    • A general definition of malware
    • Kramer, S., & Bradfield, J. C. (2010). A general definition of malware. Journal in Computer Virology, 6(2), 105-114. doi:10.1007/s11416-009-0137-1.
    • (2010) Journal in Computer Virology , vol.6 , Issue.2 , pp. 105-114
    • Kramer, S.1    Bradfield, J.C.2
  • 15
    • 33745203758 scopus 로고    scopus 로고
    • Finding application errors and security flaws using PQL: A program query language
    • Martin, M., Livshits, B., & Lam, M. S. (2005). Finding application errors and security flaws using PQL: A program query language. ACM SIGPLAN Notices, 40(10), 365-383. doi:10.1145/1103845.1094840.
    • (2005) ACM SIGPLAN Notices , vol.40 , Issue.10 , pp. 365-383
    • Martin, M.1    Livshits, B.2    Lam, M.S.3
  • 18
    • 79960228516 scopus 로고    scopus 로고
    • The top 10 most critical web application security risks
    • Retrieved April 2011
    • OWASP. (2010). The top 10 most critical web application security risks. Retrieved April 2011, from owasp.org.
    • (2010)
  • 20
    • 33745661661 scopus 로고    scopus 로고
    • Defending against injection attacks through contextsensitive string evaluation
    • Valdes, A., & Zamboni, D. (Eds.). Springer
    • Pietraszek, T., & Berghe, C. (2006). Defending against injection attacks through contextsensitive string evaluation. In Valdes, A., & Zamboni, D. (Eds.), Recent advances in intrusion detection (Vol. 3858, pp. 124-145). Springer. doi:10.1007/11663812_7.
    • (2006) Recent advances in intrusion detection , vol.3858 , pp. 124-145
    • Pietraszek, T.1    Berghe, C.2
  • 21
    • 84898278186 scopus 로고    scopus 로고
    • The current state of cybercrime and what to expect in 2011
    • USA: EMC corporation.
    • RSA. (2011). The current state of cybercrime and what to expect in 2011. USA: EMC corporation.
    • (2011)
  • 22
    • 33745216482 scopus 로고    scopus 로고
    • Paper presented at the Conference record of the 33rd ACM SIGPLAN-SIGACT symposium on Principles of programming languages. Charleston, South Carolina, USA.
    • Su, Z., & Wassermann, G. (2006). The essence of command injection attacks in web applications. Paper presented at the Conference record of the 33rd ACM SIGPLAN-SIGACT symposium on Principles of programming languages. Charleston, South Carolina, USA.
    • (2006) The essence of command injection attacks in web applications
    • Su, Z.1    Wassermann, G.2
  • 24
    • 84898224397 scopus 로고    scopus 로고
    • Retrieved February 3, 2011
    • Trend Micro. (2009). 2009's most persistent malware threats. Retrieved February 3, 2011, from http://us.trendmicro.com/imperia/md/content/us/trendwatch/researchandanalysis/2009s_most_ persistent_malware_threats__march_2010_.pdf.
    • (2009) 2009's most persistent malware threats
  • 25
    • 84898333343 scopus 로고    scopus 로고
    • Banking malware Zeus sucessfully bypasses anti-virus detection
    • Retrieved March, 2011
    • Trusteer. (2009). Banking malware Zeus sucessfully bypasses anti-virus detection. Retrieved March, 2011, from http://www.ecommerce-journal.com/news/18221_zeus_increasingly_avoids_pcs_detection.
    • (2009)
  • 26
    • 26444575798 scopus 로고    scopus 로고
    • A learning-based approach to the detection of SQL attacks
    • Julisch, K., & Kruegel, C. (Eds.). Springer
    • Valeur, F., Mutz, D., & Vigna, G. (2005). A learning-based approach to the detection of SQL attacks. In Julisch, K., & Kruegel, C. (Eds.), Detection of intrusions and malware, and vulnerability assessment (Vol. 3548, pp. 533-546). Springer. doi:10.1007/11506881_8.
    • (2005) Detection of intrusions and malware, and vulnerability assessment , vol.3548 , pp. 533-546
    • Valeur, F.1    Mutz, D.2    Vigna, G.3
  • 28
    • 84868135977 scopus 로고    scopus 로고
    • Web applications: What are they? What about them? Retrieved 2011
    • Jun 11
    • Vella, K. J. (2007, Jun 11). Web applications: What are they? What about them? Retrieved 2011, from http://www.windowsecurity.com/articles/Web-Applications.html?printversion.
    • (2007)
    • Vella, K.J.1
  • 29
    • 84898258722 scopus 로고    scopus 로고
    • Introduction to SQL
    • Retrieved April, 2011
    • W3schools. (2011). Introduction to SQL. Retrieved April, 2011, from http://www.w3schools. com/sql/sql_intro.asp.
    • (2011)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.