2012 International Conference on Computer &Amp; Information Science (ICCIS) 2012
DOI: 10.1109/iccisci.2012.6297163
|View full text |Cite
|
Sign up to set email alerts
|

A framework for development of runtime monitors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2015
2015

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…This paper extends the framework that was explained in [5]. The basic idea behind their proposed framework is given below.…”
Section: "Runtime Monitors For Tautology Based Sql Injection Attacks"mentioning
confidence: 94%
See 1 more Smart Citation
“…This paper extends the framework that was explained in [5]. The basic idea behind their proposed framework is given below.…”
Section: "Runtime Monitors For Tautology Based Sql Injection Attacks"mentioning
confidence: 94%
“…The obtained arrays are then compared and if their lengths differ, an injection is detected, otherwise if their lengths do not differ this means that there is no injection present. 5.12 "Hidden Web Crawling for SQL Injection Detection" [14] Wang et al [14] have proposed a hidden Web crawling technology that is based on the access authorization data table (AADT). The Web crawlers can be authenticated and used to gain pages behind login forms by recording authorization information through cookies, sessions, etc.…”
Section: "Use Of Query Tokenization To Detect and Prevent Sql Injectimentioning
confidence: 99%