{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T04:45:20Z","timestamp":1725597920545},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642227134"},{"type":"electronic","value":"9783642227141"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22714-1_72","type":"book-chapter","created":{"date-parts":[[2011,7,25]],"date-time":"2011-07-25T12:01:51Z","timestamp":1311595311000},"page":"693-702","source":"Crossref","is-referenced-by-count":0,"title":["SQL Injection Disclosure Using BLAH Algorithm"],"prefix":"10.1007","author":[{"given":"Justy","family":"Jameson","sequence":"first","affiliation":[]},{"given":"K. K.","family":"Sherly","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"72_CR1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2007.43","volume-title":"A Static Analysis Framework For Detecting SQL Injection Vulnerabilities","author":"X. Fu","year":"2007","unstructured":"Fu, X., Lu, X., Peltsverger, B., Chen, S.: A Static Analysis Framework For Detecting SQL Injection Vulnerabilities. IEEE, Los Alamitos (2007)"},{"key":"72_CR2","volume-title":"WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation","author":"W.G.J. Halfond","year":"2003","unstructured":"Halfond, W.G.J., Orso, A., Manolios, P.: WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation. IEEE, Los Alamitos (2003)"},{"key":"72_CR3","volume-title":"International Workshop on Software Engineering and Secure System","author":"S. Thomas","year":"2006","unstructured":"Thomas, S., Williams, L.: Using Automated Fix Generation to Secure SQL Statements. In: International Workshop on Software Engineering and Secure System. IEEE, Los Alamitos (2006)"},{"key":"72_CR4","unstructured":"A heuristic-based approach for detecting SQL-injection vulnerabilities in Web applications by Angelo Ciampa,Corrado Aaron Visaggio, Massimiliano Di Penta"},{"key":"72_CR5","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315249","volume-title":"CANDID: Preventing SQL Injection Attacks using Dynamic Candidate Evaluations","author":"S. Bandhakavi","year":"2007","unstructured":"Bandhakavi, S.: CANDID: Preventing SQL Injection Attacks using Dynamic Candidate Evaluations. ACM, New York (2007)"},{"key":"72_CR6","first-page":"31","volume-title":"Data Security & Privacy","author":"A. Kamra","year":"2008","unstructured":"Kamra, A., Bertino, E., Lebanon, G.: Mechanisms for database intrusion detection and response. In: Data Security & Privacy, pp. 31\u201336. ACM, New York (2008)"},{"key":"72_CR7","unstructured":"Ali, S., Rauf, A., Javed, H.: SQLIPA: An Authentication Mechanism Against SQL Injection"},{"key":"72_CR8","doi-asserted-by":"crossref","unstructured":"Su, Z., Wassermann, G.: The Essence of Command Injection Attacks in Web Applications. In: 33rd ACM (2006)","DOI":"10.1145\/1111037.1111070"},{"key":"72_CR9","unstructured":"Anely, C.: Advanced SQL injection in sql server application.Next generation security software ltd. White paper (2002)"},{"key":"72_CR10","unstructured":"A linear Algorithm for Computing Maximal Common Subsequences by D.S. Hirschberg Princeton University"},{"key":"72_CR11","unstructured":"Livshits, V.B., Lam, M.S.: Finding Security vulnerability in java applications with static analysis. In: Proceedings of the 14th Usenix Security Symposium (August 2005)"},{"key":"72_CR12","doi-asserted-by":"crossref","unstructured":"Buehrer, G.T., Weide, B.W., Sivilotti, P.A.G.: Using Parse tree validation to prevent SQL Injection attacks. In: Proc. Of the 5th International Workshop on Software Engineering and Middleware (SEM 2005), pp. 106\u2013113 (September 2005)","DOI":"10.1145\/1108473.1108496"},{"key":"72_CR13","doi-asserted-by":"crossref","unstructured":"Nguyen-tuong, A., Guarnieri, S., Greene, D., Shirley, J., Evans, D.: Automatically hardening web applications using Precise Tainting. In: Twentieth IFIP Intl, Information security conference(SEC 2005) (May 2005)","DOI":"10.1007\/0-387-25660-1_20"},{"key":"72_CR14","unstructured":"Kiani, M., Clark, A., Mohay, G.: Evaluation of anomaly based character Distribution models in the detection of SQL injection attack"},{"key":"72_CR15","doi-asserted-by":"crossref","unstructured":"Halfond, W.G.J., Orso, A.: Combining Static Analysis and Runtime monitoring to counter SQL Injection attacks. In: 3rd International Workshop on Dynamic Analysis, St. Louis, Missouri, p. 1 (2005)","DOI":"10.1145\/1083246.1083250"},{"key":"72_CR16","doi-asserted-by":"crossref","unstructured":"Halfond, W.G.J., Orso, A., Manolios, P.: WASP:Protecting Web Applications Using Positive Tainting and Syntax-AwareEvaluation. IEEE Transaction of Software Engineering\u00a034(1) (January\/February 2008)","DOI":"10.1109\/TSE.2007.70748"},{"key":"72_CR17","doi-asserted-by":"publisher","DOI":"10.1109\/IADCC.2009.4809188","volume-title":"Combinatorial Approach for Preventing SQL Injection Attacks","author":"R. Ezumalai","year":"2009","unstructured":"Ezumalai, R., Aghila, G.: Combinatorial Approach for Preventing SQL Injection Attacks. IEEE, Los Alamitos (2009)"},{"key":"72_CR18","unstructured":"Kundu, A., Panigrahi, S., Sural, S., Majumdar, A.K.: Senior Member, IEEE, BLAST-SSAHA Hybridization for Credit Card Fraud Detection"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22714-1_72","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,30]],"date-time":"2019-03-30T13:26:25Z","timestamp":1553952385000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22714-1_72"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642227134","9783642227141"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22714-1_72","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}