Defeating SQL injection
The best strategy for combating SQL injection, which has emerged as the most widespread website security risk, calls for integrating defensive coding practices with both vulnerability detection and runtime attack prevention methods.
Saved in:
Main Authors: | SHAR, Lwin Khin, TAN, Hee Beng Kuan |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2012
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/4898 https://ink.library.smu.edu.sg/context/sis_research/article/5901/viewcontent/Defeating___PV.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Semi-automated verification of defense against SQL injection in web applications
by: LIU, Kaiping, et al.
Published: (2012) -
Automated removal of cross site scripting vulnerabilities in web applications
by: SHAR, Lwin Khin, et al.
Published: (2011) -
Systematically enhancing black-box web vulnerability scanners
by: VENKATRAMAN SAI SATHYANARAYAN
Published: (2012) -
Defending against cross site scripting attacks
by: SHAR, Lwin Khin, et al.
Published: (2011) -
Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities
by: SHAR, Lwin Khin, et al.
Published: (2012)