Semi-automated verification of defense against SQL injection in web applications
Recent reports reveal that majority of the attacks to Web applications are input manipulation attacks. Among these attacks, SQL injection attack malicious input is submitted to manipulate the database in a way that was unintended by the applications' developers is one such attack. This paper pr...
Saved in:
Main Authors: | LIU, Kaiping, TAN, Hee Beng Kuan, SHAR, Lwin Khin |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2012
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/4838 https://ink.library.smu.edu.sg/context/sis_research/article/5841/viewcontent/Semi_automated_verification_of_defense_against_SQL_injection_2012_av.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities
by: SHAR, Lwin Khin, et al.
Published: (2012) -
Security slicing for auditing XML, XPath, and SQL injection vulnerabilities
by: THOME, Julian, et al.
Published: (2015) -
Defeating SQL injection
by: SHAR, Lwin Khin, et al.
Published: (2012) -
Predicting SQL injection and cross site scripting vulnerabilities through mining input sanitization patterns
by: SHAR, Lwin Khin, et al.
Published: (2013) -
Defending against cross site scripting attacks
by: SHAR, Lwin Khin, et al.
Published: (2011)