The essence of command injection attacks in web applications
Top Cited Papers
- 11 January 2006
- proceedings article
- Published by Association for Computing Machinery (ACM)
- Vol. 41 (1) , 372-382
- https://doi.org/10.1145/1111037.1111070
Abstract
No abstract availableKeywords
This publication has 25 references indexed in Scilit:
- Defending Against Injection Attacks Through Context-Sensitive String EvaluationPublished by Springer Nature ,2006
- Using parse tree validation to prevent SQL injection attacksPublished by Association for Computing Machinery (ACM) ,2005
- The Essence of Data Access in CωPublished by Springer Nature ,2005
- Automatically Hardening Web Applications Using Precise TaintingPublished by Springer Nature ,2005
- Static analysis of role-based access control in J2EE applicationsACM SIGSOFT Software Engineering Notes, 2004
- Securing web application code by static analysis and runtime protectionPublished by Association for Computing Machinery (ACM) ,2004
- SQLrand: Preventing SQL Injection AttacksPublished by Springer Nature ,2004
- Specifying and enforcing application-level web security policiesIEEE Transactions on Knowledge and Data Engineering, 2003
- Global Data Flow Analysis and Iterative AlgorithmsJournal of the ACM, 1976
- A unified approach to global program optimizationPublished by Association for Computing Machinery (ACM) ,1973