Enhanced pushdown automaton based static analysis for detection of SQL injection Hotspots in web application
SQL injection Hotspots (SQLiHs) are Application’s Entry Points (AEPs) through which SQL injection is possible, subject to the application’s internal sanitization or validation capabilities. Since not all AEPs are SQLiHs, one serious challenge during testing of very large web application for detectio...
| Main Authors: | Umar, Kabir, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty, Abdullah @ Selimun, Mohd Taufik |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Indian Society for Education and Environment
2016
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/54163/ http://psasir.upm.edu.my/id/eprint/54163/1/Enhanced%20pushdown%20automaton%20based%20static%20analysis%20for%20detection%20of%20SQL%20injection%20Hotspots%20in%20web%20application.pdf |
Similar Items
SQL Injection attack roadmap and fusion
by: Umar, Kabir, et al.
Published: (2016)
by: Umar, Kabir, et al.
Published: (2016)
Comparing web vulnerability scanners with a new method for SQL injection vulnerabilities detection and removal EPSQLiFix
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
Prevention of attack on Islamic websites by fixing SQL injection vulnerabilities using co-evolutionary search approach
by: Umar, Kabir, et al.
Published: (2014)
by: Umar, Kabir, et al.
Published: (2014)
An OpenURL resolver (SFX) in action: the answer to a librarian's prayer or a burden for technical services?
by: Sutherland, Alison, et al.
Published: (2004)
by: Sutherland, Alison, et al.
Published: (2004)
Maintaining regularity and generalizationin data using the minimum description length principle and genetic algorithm: case of grammatical inference
by: Pandey, Hari Mohan, et al.
Published: (2016)
by: Pandey, Hari Mohan, et al.
Published: (2016)
Contextual influences on the visual sensitivity of moving and static patterns
by: Chambers, Alison L.
Published: (2016)
by: Chambers, Alison L.
Published: (2016)
QACA: Quality assured context acquisition in context-aware computing
by: Li, Y., et al.
Published: (2011)
by: Li, Y., et al.
Published: (2011)
Defining fitness function for search based assessment of grammar reachability
by: Umar, Kabir, et al.
Published: (2018)
by: Umar, Kabir, et al.
Published: (2018)
Optimization of a fed-batch bioreactor for 1,3-propanediol production using hybrid nonlinear optimal control
by: Ye, J., et al.
Published: (2014)
by: Ye, J., et al.
Published: (2014)
Heat transfer and nanofluid flow characteristics in microchannel heat sink with different shapes
by: Kadhim, Altayyeb Abdullah
Published: (2013)
by: Kadhim, Altayyeb Abdullah
Published: (2013)
On the effects of energy-aware traffic engineering on routing reliability
by: Lin, Gongqi, et al.
Published: (2013)
by: Lin, Gongqi, et al.
Published: (2013)
On the automation of vulnerabilities fixing for web application
by: Umar, Kabir, et al.
Published: (2014)
by: Umar, Kabir, et al.
Published: (2014)
Recognition of simple splicing systems using SH-automaton
by: Fong, Wan Heng, et al.
Published: (2008)
by: Fong, Wan Heng, et al.
Published: (2008)
Thermal management of an advanced aircraft actuation system
by: Goh, Chin Kung
Published: (2018)
by: Goh, Chin Kung
Published: (2018)
Cooperative and Geometric Learning for Path P{lanning of UAVs
by: Zhang, B., et al.
Published: (2013)
by: Zhang, B., et al.
Published: (2013)
Maximizing bandwidth using disjoint paths
by: Loh, R., et al.
Published: (2010)
by: Loh, R., et al.
Published: (2010)
An empirical comparison of commercial and open‐source web vulnerability scanners
by: Amankwah, Richard, et al.
Published: (2020)
by: Amankwah, Richard, et al.
Published: (2020)
Thermal management of solid state power switches
by: Tighe, Christopher James Frederick
Published: (2011)
by: Tighe, Christopher James Frederick
Published: (2011)
Leakage and atmospheric dispersion of CO2 associated with carbon capture and storage projects
by: Mazzoldi, Alberto
Published: (2009)
by: Mazzoldi, Alberto
Published: (2009)
The tolerance of wheat (Triticum aestivum L.) to Septori tritici blotch
by: Collin, François
Published: (2018)
by: Collin, François
Published: (2018)
Numerical investigation of heat transfer of a multi-layered microchannel heat sink with tapered channel
by: Zuo, Jiawei
Published: (2023)
by: Zuo, Jiawei
Published: (2023)
Feed technology and production performance of Thai koi (Anabas testudeneus) in Bangladesh
by: Sarker, Md. Al Amin, et al.
Published: (2016)
by: Sarker, Md. Al Amin, et al.
Published: (2016)
Poverty, vulnerability, and child labour: evidence from Uganda
by: Angemi, Diego
Published: (2008)
by: Angemi, Diego
Published: (2008)
The effect of humour during investigative interviewing in forensic settings
by: Mason, Matthew
Published: (2020)
by: Mason, Matthew
Published: (2020)
Kaplan's three monsters
by: Predelli, Stefano
Published: (2014)
by: Predelli, Stefano
Published: (2014)
Comparison of security testing approaches for detection of SQL injection vulnerabilities
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)
Gap analysis in specifying porting requirements for mobile application
by: Rajadorai, Kesava Pillai, et al.
Published: (2016)
by: Rajadorai, Kesava Pillai, et al.
Published: (2016)
Overcoming the Limits to Change and Adapting to Future Challenges: Governing the Transformation of Destination Networks in Western Australia
by: Pforr, Christof, et al.
Published: (2014)
by: Pforr, Christof, et al.
Published: (2014)
Energy-aware traffic engineering with reliability constraint
by: Lin, GongQi, et al.
Published: (2015)
by: Lin, GongQi, et al.
Published: (2015)
Wacana kritis dalam penentuan makna perkataan Arab berdasarkan petunjuk konteks
by: Mansor, Syazmira
Published: (2019)
by: Mansor, Syazmira
Published: (2019)
Towards cross-site scripting vulnerability detection in mobile web applications
by: Hydara, Isatou, et al.
Published: (2018)
by: Hydara, Isatou, et al.
Published: (2018)
Current state of research on cross-site scripting (XSS) – a systematic literature review
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Removing cross-site scripting vulnerabilities from web applications using the OWASP ESAPI security guidelines
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Removing cross-site scripting vulnerabilities from web applications using the OWASP ESAPI security guidelines
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Cross-site scripting detection based on an enhanced genetic algorithm
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Security impact of cross-site scripting vulnerabilities on web applications and their awareness
by: Hydara, Isatou, et al.
Published: (2022)
by: Hydara, Isatou, et al.
Published: (2022)
Understanding and protecting vulnerable financial consumers
by: Cartwright, Peter
Published: (2015)
by: Cartwright, Peter
Published: (2015)
Diluting substantive equality: why the UK government doesn't know if its welfare reforms promote equality
by: Roberts, Simon, et al.
Published: (2017)
by: Roberts, Simon, et al.
Published: (2017)
Virtual Penetration Testing: A Joint Education Exercise across Geographic Borders
by: Armstrong, Helen, et al.
Published: (2013)
by: Armstrong, Helen, et al.
Published: (2013)
Entrepreneurship in Context: Exploring the Influencing Factors on Entrepreneurial Activity in Germany
by: Kumar, Priyanka
Published: (2016)
by: Kumar, Priyanka
Published: (2016)
Similar Items
-
SQL Injection attack roadmap and fusion
by: Umar, Kabir, et al.
Published: (2016) -
Comparing web vulnerability scanners with a new method for SQL injection vulnerabilities detection and removal EPSQLiFix
by: Md Sultan, Abu Bakar, et al.
Published: (2018) -
Prevention of attack on Islamic websites by fixing SQL injection vulnerabilities using co-evolutionary search approach
by: Umar, Kabir, et al.
Published: (2014) -
An OpenURL resolver (SFX) in action: the answer to a librarian's prayer or a burden for technical services?
by: Sutherland, Alison, et al.
Published: (2004) -
Maintaining regularity and generalizationin data using the minimum description length principle and genetic algorithm: case of grammatical inference
by: Pandey, Hari Mohan, et al.
Published: (2016)