Vulnerability & Attack Injection for Web Applications



39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2009), June 2009

Cited by

Year 2013 : 1 citations

 Nana Yaw Asabere, Wisdom Kwawu Torgby, "Towards a Perspective of Web Application Vulnerabilities and Security Threats", International Journal of Computer Science and Telecommunications, Vol. 4, Issue 5, May 2013.

Year 2012 : 4 citations

 L. Shar, H. Tan, H. "Defeating SQL Injection", IEEE Computer, 2012.

 Kaiping Liu, Hee Beng Kuan Tan, and L.K. Shar, “Semi-­Automated Verification of Defense against SQL Injection in Web Applications”, 19th Asia-Pacific Software Engineering Conference, APSEC 2012, ­Hong Kong, December 4-7, 2012.

 Rim Akrout, "Analyse de vulnérabilités et évaluation de systèmes de détection d'intrusions pour les applications Web", PhD Thesis, Institut National des Sciences Appliquées de Toulouse (INSA Toulouse), Toulouse, France, October 2012.

 M. Ghafari, H. Shoja, M. Y. Amirani, "Detection and Prevention of Data Manipulation from Client Side in Web Applications", IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, UK, June 25-27, 2012.

Year 2011 : 6 citations

 Geoffrey Vaughan, "Understanding SQL Injection Attacks Inside and Out", Faculty of Business and IT, University of Ontario Institute of Technology, Canada, 2011.

 Roberto Natella, “Achieving Representative Faultloads in Software Fault Injection”, PhD Thesis, Universita' Degli Studi di Napoli Federico II, Italy, November 2011.

 Jeff Stuckman, James Purtilo, "A Testbed for the Evaluation of Web Intrusion Prevention Systems", 2011 Third International Workshop on Security Measurements and Metrics, Metrisec, September 2011.

 Eidah Al-Khashab, Fawaz S. Al-Anzi, Ayed A. Salman, "PSIAQOP: preventing SQL injection attacks based on query optimization process", Second Kuwait Conference on e-Services and e-Systems, KCESS'11, Kuwait, Kuwait, April 5, 2011.

 A. Bondavalli, P. Lollini, A. Bovenzi, M. Colajanni, L. Coppolino, C. Esposito, M. Fixxo, C. di Martino, L. Montecchi, R. Natella, A. Peccia, "D3.1: Modeling and Evaluation: State-of-the-art", deliverable of the project: Dependable Off-The-Shelf based Middleware Systems for Large-scale Complex Critical Infrastructures (DOTS-LCCI Project: PRIN 2008LWRBHF), Italy, March 2011.

 Francisco Vieira, “Realistic Vulnerability Injections in PHP Web Applications”, MSc Thesis, Faculty of Sciences, University of Lisbon, Lisbon, Portugal, 2011.

Year 2010 : 2 citations

 1. Célio B. Taquary Segundo, Luis Fernando Rust C. Carmo, Luci Pirmez, “Uso de Árvores de Ataque e Técnicas de Mutação de Código na Segurança de Aplicações Web”, X Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais, SBSeg’10, Fortaleza, Brazil, October 2010.

 2. Rim Akrout, Anthony Dessiatnikoff, “An Attack-goal Driven Approach for Web Applications Security Assessment”, Eigth European Dependable Computing Conference, EDCC 2010, Valencia, Spain, April 2010.

Year 2009 : 1 citations

 1. Karthik Pattabiraman, Benjamin Zorn, “DoDOM: Leveraging DOM Invariants for Web 2.0 Application Reliability”, Technical Report, Microsoft Research - Redmond, USA, 2009.