[go: up one dir, main page]

Janot et al., 2008 - Google Patents

Preventing SQL injections in online applications: Study, recommendations and Java solution prototype based on the SQL DOM

Janot et al., 2008

View PDF
Document ID
8306025392163261610
Author
Janot E
Zavarsky P
Publication year

External Links

Snippet

SQL Injection Attacks are a relatively recent threat to the confidentiality, integrity and availability of online applications and their technical infrastructure, accounting for nearly a fourth of web vulnerabilities [1]. In this paper based on a master thesis [2], and numerous …
Continue reading at ualberta.scholaris.ca (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2145Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect

Similar Documents

Publication Publication Date Title
Alwan et al. Detection and prevention of SQL injection attack: a survey
Abikoye et al. A novel technique to prevent SQL injection and cross-site scripting attacks using Knuth-Morris-Pratt string match algorithm
Li et al. A survey on server-side approaches to securing web applications
Mitropoulos et al. Defending against web application attacks: Approaches, challenges and implications
Almorsy et al. Supporting automated vulnerability analysis using formalized vulnerability signatures
Wei et al. Preventing SQL injection attacks in stored procedures
Singh et al. xBook: Redesigning Privacy Control in Social Networking Platforms.
Marback et al. A threat model‐based approach to security testing
Tajpour et al. SQL injection detection and prevention techniques
Cirnu et al. Measures to mitigate cybersecurity risks and vulnerabilities in service-oriented architecture
Elshazly et al. A survey of SQL injection attack detection and prevention
Chaudhary et al. Securing heterogeneous embedded devices against XSS attack in intelligent IoT system
Zhang et al. Malicious package detection in npm and pypi using a single model of malicious behavior sequence
Dhariwal et al. C-Queued Technique against SQL injection attack
Kausar et al. SQL injection detection and prevention techniques in ASP .NET web application
Gupta et al. Attacks on web services need to secure XML on web
Naderi-Afooshteh et al. Joza: Hybrid taint inference for defeating web application sql injection attacks
Gupta et al. Evaluation and monitoring of XSS defensive solutions: a survey, open research issues and future directions
Hou et al. Towards analyzing mongodb nosql security and designing injection defense solution
Vijayalakshmi et al. Case Study: extenuation of XSS attacks through various detecting and defending techniques
Futoransky et al. A dynamic technique for enhancing the security and privacy of web applications
Dwivedi et al. A Survey on Security Threats and Mitigation Strategies for NoSQL Databases: MongoDB as a Use Case
Janot et al. Preventing SQL injections in online applications: Study, recommendations and Java solution prototype based on the SQL DOM
Aliero et al. Classification of Sql Injection Detection And Prevention Measure
Dwivedi et al. SQLAS: Tool to detect and prevent attacks in php web applications