Futoransky et al., 2007 - Google Patents
A dynamic technique for enhancing the security and privacy of web applicationsFutoransky et al., 2007
View PDF- Document ID
- 10528001468009408122
- Author
- Futoransky A
- Gutesman E
- Waissbein A
- Publication year
- Publication venue
- Proc. Black Hat USA
External Links
Snippet
Web application security and privacy became a central concern among the security community. The problems that are faced once an application is compromised necessarily demands special attention. The emerging programming languages, which allow …
- 238000000034 method 0 title abstract description 22
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Alwan et al. | Detection and prevention of SQL injection attack: a survey | |
| Bisht et al. | XSS-GUARD: precise dynamic prevention of cross-site scripting attacks | |
| Li et al. | A survey on server-side approaches to securing web applications | |
| Wei et al. | Preventing SQL injection attacks in stored procedures | |
| Nguyen-Tuong et al. | Automatically hardening web applications using precise tainting | |
| Xu et al. | Jstill: mostly static detection of obfuscated malicious javascript code | |
| Pelizzi et al. | Protection, usability and improvements in reflected XSS filters | |
| Almorsy et al. | Supporting automated vulnerability analysis using formalized vulnerability signatures | |
| Li et al. | A survey on web application security | |
| Mukherjee et al. | SQL Injection: A sample review | |
| Kausar et al. | SQL injection detection and prevention techniques in ASP .NET web application | |
| Tajpour et al. | SQL injection detection and prevention techniques | |
| Barua et al. | Server side detection of content sniffing attacks | |
| Gupta et al. | Evaluation and monitoring of XSS defensive solutions: a survey, open research issues and future directions | |
| Naderi-Afooshteh et al. | Joza: Hybrid taint inference for defeating web application sql injection attacks | |
| Futoransky et al. | A dynamic technique for enhancing the security and privacy of web applications | |
| Johns et al. | SMask: preventing injection attacks in web applications by approximating automatic data/code separation | |
| Das et al. | Detection of cross-site scripting attack under multiple scenarios | |
| Dhariwal et al. | C-Queued Technique against SQL injection attack | |
| Janot et al. | Preventing SQL injections in online applications: study, recommendations and Java solution prototype based on the SQL DOM | |
| Sayed et al. | Detection and mitigation of malicious JavaScript using information flow control | |
| Dwivedi et al. | Web application vulnerabilities: A survey | |
| Wang et al. | XSS attack detection and prevention system based on instruction set randomization | |
| Gomaa et al. | Survey on securing a querying process by blocking SQL injection | |
| Kumar et al. | Constructing secure web applications with proper data validations |