2019
DOI: 10.1007/978-3-030-15235-2_125
|View full text |Cite
|
Sign up to set email alerts
|

Research and Implementation of Web Application System Vulnerability Location Technology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…However, due to the limited dataset that can be crawled, the attack types detected by this method are relatively few. Zheng et al proposes a novel vulnerability location technology, which can intercept injected statements according to vulnerability types [20]. However, the focus of this paper is vulnerability detection rather than SQL injection attack detection.…”
Section: Related Workmentioning
confidence: 99%
“…However, due to the limited dataset that can be crawled, the attack types detected by this method are relatively few. Zheng et al proposes a novel vulnerability location technology, which can intercept injected statements according to vulnerability types [20]. However, the focus of this paper is vulnerability detection rather than SQL injection attack detection.…”
Section: Related Workmentioning
confidence: 99%
“…The web services are the implementation technology of SOA, and these web services can be accessed over the web using standard Internet protocols such as HTTP (HyperText Transfer Protocol) and HTTPS (Hypertext Transfer Protocol Secure). The security for service oriented architecture is defaulted to transport and network layer security, which is inadequate and obsolete for this current trend of web and communication technologies (Kulesza et al, 2018); (Sfar et al, 2018); (Zheng et al, 2019); (Rudman & Bruwer, 2016); (Newman et al, 2016); (Sirohi et al, 2016). The vendor products are still evolving; however, many products breach the security standards for customization or demand to use as the whole product end-to-end, or both.…”
Section: Introductionmentioning
confidence: 99%