Proceedings of the Eleventh International Conference on World Wide Web - WWW '02 2002
DOI: 10.1145/511495.511498
|View full text |Cite
|
Sign up to set email alerts
|

Abstracting application-level web security

Abstract: Application-level web security refers to vulnerabilities inherent in the code of a web-application itself (irrespective of the technologies in which it is implemented or the security of the web-server/back-end database on which it is built). In the last few months application-level vulnerabilities have been exploited with serious consequences: hackers have tricked e-commerce sites into shipping goods for no charge, usernames and passwords have been harvested and confidential information (such as addresses and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
45
0
4

Year Published

2005
2005
2020
2020

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(49 citation statements)
references
References 4 publications
0
45
0
4
Order By: Relevance
“…Other researchers have developed techniques specifically targeted at SQLIAs. Scott and Sharp [23] use a proxy to filter input and output data streams for a web application based on policy rules defined at the enterprise level. Although this technique can be effective against SQLIA, it requires developers to correctly specify filtering rules for each application input.…”
Section: Related Workmentioning
confidence: 99%
“…Other researchers have developed techniques specifically targeted at SQLIAs. Scott and Sharp [23] use a proxy to filter input and output data streams for a web application based on policy rules defined at the enterprise level. Although this technique can be effective against SQLIA, it requires developers to correctly specify filtering rules for each application input.…”
Section: Related Workmentioning
confidence: 99%
“…Russell A. Mcclure introduces SQLDOM [10] approach removes tautology, incorrect query, union query,piggy -backed query attack but stored procedure and scripting attack was not removed Meijunjin SQLInjectionGen [13]approach removes tautology, incorrect query, union query,piggy-backed query attack but stored procedure and scripting attack was not removed Engine kirda introduces Noxes [19] approach removes scripting attack but tautology, union query, piggy -backed query ,incorrect query, stored procedure attack was not removed. David scott introduces SPDL Based [17] approach removes scripting attack but tautology, union query, piggy -backed query ,incorrect query, stored procedure attack was not removed.…”
Section: Introductionmentioning
confidence: 99%
“…Some research is geared towards attempting to validate user inputs [18,19,20]. Unfortunately, this is appears to be difficult because most existing approaches have little knowledge of the syntactic structure of generated queries, hence some malicious inputs still manage to pass through [3].…”
Section: Introductionmentioning
confidence: 99%