[go: up one dir, main page]

Shanmughaneethi et al., 2011 - Google Patents

SQLIVD-AOP: Preventing SQL Injection Vulnerabilities Using Aspect Oriented Programming through Web Services

Shanmughaneethi et al., 2011

Document ID
16594123859750476100
Author
Shanmughaneethi V
Pravin R
Shyni C
Swamynathan S
Publication year
Publication venue
International Conference on High Performance Architecture and Grid Computing

External Links

Snippet

Security remains a major threat to the entire Web for many kinds of transactions. Most of the threats are created through application level vulnerabilities and have been exploited with serious consequences. Among the various types of application level vulnerabilities …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting

Similar Documents

Publication Publication Date Title
Alwan et al. Detection and prevention of SQL injection attack: a survey
Livshits et al. Finding Security Vulnerabilities in Java Applications with Static Analysis.
Wei et al. Preventing SQL injection attacks in stored procedures
Almorsy et al. Supporting automated vulnerability analysis using formalized vulnerability signatures
Yeole et al. Analysis of different technique for detection of SQL injection
Tajpour et al. Web application security by sql injection detectiontools
Deepa et al. Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications
Tajpour et al. SQL injection detection and prevention tools assessment
Shahriar et al. Injecting comments to detect JavaScript code injection attacks
Das et al. An approach to detection of SQL injection attack based on dynamic query matching
Kausar et al. SQL injection detection and prevention techniques in ASP .NET web application
ÐURIĆ WAPTT-Web application penetration testing tool
George et al. Token based detection and neural network based reconstruction framework against code injection vulnerabilities
Yan et al. Detection method of the second-order SQL injection in web applications
Sharma et al. SQL injection attacks-a systematic review
Chen et al. Synthdb: Synthesizing database via program analysis for security testing of web applications
Khochare et al. Survey on SQL Injection attacks and their Countermeasures
Shanmughaneethi et al. SBSQLID: Securing web applications with service based SQL injection detection
Dharam et al. Runtime monitoring technique to handle tautology based SQL injection attacks
Shanmughaneethi et al. SQLIVD-AOP: Preventing SQL Injection Vulnerabilities Using Aspect Oriented Programming through Web Services
Dharam et al. Runtime monitors to detect and prevent union query based SQL injection attacks
Janot et al. Preventing SQL injections in online applications: Study, recommendations and Java solution prototype based on the SQL DOM
Gadgikar Preventing SQL injection attacks using negative tainting approach
Kusuma Analysis of SQL injection attacks on website service
Archana Devi et al. Prevention and detection of SQL injection attacks using generic decryption