Shanmughaneethi et al., 2011 - Google Patents
SQLIVD-AOP: Preventing SQL Injection Vulnerabilities Using Aspect Oriented Programming through Web ServicesShanmughaneethi et al., 2011
- Document ID
- 16594123859750476100
- Author
- Shanmughaneethi V
- Pravin R
- Shyni C
- Swamynathan S
- Publication year
- Publication venue
- International Conference on High Performance Architecture and Grid Computing
External Links
Snippet
Security remains a major threat to the entire Web for many kinds of transactions. Most of the threats are created through application level vulnerabilities and have been exploited with serious consequences. Among the various types of application level vulnerabilities …
- 239000007924 injection 0 title abstract description 65
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Alwan et al. | Detection and prevention of SQL injection attack: a survey | |
Livshits et al. | Finding Security Vulnerabilities in Java Applications with Static Analysis. | |
Wei et al. | Preventing SQL injection attacks in stored procedures | |
Almorsy et al. | Supporting automated vulnerability analysis using formalized vulnerability signatures | |
Yeole et al. | Analysis of different technique for detection of SQL injection | |
Tajpour et al. | Web application security by sql injection detectiontools | |
Deepa et al. | Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications | |
Tajpour et al. | SQL injection detection and prevention tools assessment | |
Shahriar et al. | Injecting comments to detect JavaScript code injection attacks | |
Das et al. | An approach to detection of SQL injection attack based on dynamic query matching | |
Kausar et al. | SQL injection detection and prevention techniques in ASP .NET web application | |
ÐURIĆ | WAPTT-Web application penetration testing tool | |
George et al. | Token based detection and neural network based reconstruction framework against code injection vulnerabilities | |
Yan et al. | Detection method of the second-order SQL injection in web applications | |
Sharma et al. | SQL injection attacks-a systematic review | |
Chen et al. | Synthdb: Synthesizing database via program analysis for security testing of web applications | |
Khochare et al. | Survey on SQL Injection attacks and their Countermeasures | |
Shanmughaneethi et al. | SBSQLID: Securing web applications with service based SQL injection detection | |
Dharam et al. | Runtime monitoring technique to handle tautology based SQL injection attacks | |
Shanmughaneethi et al. | SQLIVD-AOP: Preventing SQL Injection Vulnerabilities Using Aspect Oriented Programming through Web Services | |
Dharam et al. | Runtime monitors to detect and prevent union query based SQL injection attacks | |
Janot et al. | Preventing SQL injections in online applications: Study, recommendations and Java solution prototype based on the SQL DOM | |
Gadgikar | Preventing SQL injection attacks using negative tainting approach | |
Kusuma | Analysis of SQL injection attacks on website service | |
Archana Devi et al. | Prevention and detection of SQL injection attacks using generic decryption |