Results 21 to 30 of about 12,963 (201)
Some security issues for web based frameworks [PDF]
This report investigates whether a vulnerability found in one web framework may be used to find a vulnerability in a different web framework. To test this hypothesis, several open source applications were installed in a secure test environment together ...
Ellman, Jeremy, Roberts-Morpeth, P.
core +1 more source
Implementasi Web Application Firewall Dalam Mencegah Serangan SQL Injection Pada Website
Dalam beberapa tahun terakhir perkembangan teknologi informasi menjadi semakin pesat, perkembangan ini membuat segala aktifitas dan pekerjaan menjadi lebih mudah, seperti halnya untuk mengakses berita maupun informasi.
Bangkit Wiguna +2 more
doaj +1 more source
Systematic literature review on SQL injection attack [PDF]
SQL injection attack is a common threat to web applications that utilizes poor input validation to implement attack on a target database. It is becoming a very serious problem in web applications as successful execution leads to loss of integrity and ...
Aminu, Lawal Muhammad +2 more
core +1 more source
Analysis of protection capabilities against SQL Injection attacks
Publication refers to SQL Injection attacks whose are one of the most dangerous in a cyberspace. Based on a literature studies, classification of the SQL Injection attacks was prepared.
Bogdan Krawczyński +2 more
doaj +1 more source
A Static Detection Method for SQL Injection Vulnerability Based on Program Transformation
Static analysis is popular for detecting SQL injection vulnerabilities. However, due to the lack of accurate modeling of object-oriented database extensions, current methods fail to accurately detect SQL injection vulnerabilities in applications that use
Ye Yuan +5 more
doaj +1 more source
SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks
AbstractSecuring the web against frequent cyber attacks is a big concern as attackers usually intend to snitch private information, financial information, deface and damages websites to prove their hacking capabilities. This type of vandalism may drive many corporations that conduct their business through the web to suffer financial and reputation ...
Abdul Bashah Mat Ali +3 more
openaire +2 more sources
A Systematic Literature Review on SQL Injection Attacks
With the increasing use of web applications, concerns for data integrity and security have increased manifolds in the current time. The growth in quantity of internet clients and sites has made the web security circumstances progressively extreme ...
Maryam Mehmood, Asad Ijaz
doaj +1 more source
Research on SQL injection detection technology based on SVM
SQL injection, which has the characteristics of great harm and fast variation, has always ranked the top of the OWASP TOP 10, which has always been a hot spot in the research of web security.
Chen Zhuang, Guo Min, zhou Lin
doaj +1 more source
Living City, A Collaborative Browser-Based Massively Multiplayer Online Game [PDF]
This work presents the design and implementation of our Browser-based Massively Multiplayer Online Game, Living City, a simulation game fully developed at the University of Messina.
Ferrara, Emilio +2 more
core +2 more sources
Penetration test method using blind SQL injection based on second-order fragment and reassembly
How to get rid of the blindness of current SQL injection penetration test,produce the optimized attack pattern of SQL injection,enhance the effectiveness in the phase of attack generation,and improve the accuracy of vulnerability detection of SQL ...
De-guang LE +4 more
doaj +2 more sources

