Semi-automated verification of defense against SQL injection in web applications
Recent reports reveal that majority of the attacks to Web applications are input manipulation attacks. Among these attacks, SQL injection attack malicious input is submitted to manipulate the database in a way that was unintended by the applications' developers is one such attack. This paper pr...
Saved in:
Main Authors: | Liu, Kaiping, Tan, Hee Beng Kuan, Shar, Lwin Khin |
---|---|
Other Authors: | School of Electrical and Electronic Engineering |
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2013
|
Online Access: | https://hdl.handle.net/10356/96596 http://hdl.handle.net/10220/12895 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Semi-automated verification of defense against SQL injection in web applications
by: LIU, Kaiping, et al.
Published: (2012) -
Defeating SQL injection
by: SHAR, Lwin Khin, et al.
Published: (2012) -
Auditing the defense against cross site scripting in web applications
by: SHAR, Lwin Khin, et al.
Published: (2010) -
Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities
by: Shar, Lwin Khin, et al.
Published: (2013) -
Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities
by: SHAR, Lwin Khin, et al.
Published: (2012)