{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:46:12Z","timestamp":1725529572023},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642365621"},{"type":"electronic","value":"9783642365638"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36563-8_15","type":"book-chapter","created":{"date-parts":[[2013,2,22]],"date-time":"2013-02-22T01:32:47Z","timestamp":1361496767000},"page":"213-228","source":"Crossref","is-referenced-by-count":3,"title":["Eliminating SQL Injection and Cross Site Scripting Using Aspect Oriented Programming"],"prefix":"10.1007","author":[{"given":"Bojan","family":"Simic","sequence":"first","affiliation":[]},{"given":"James","family":"Walden","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"Webroot. State of Internet Security \u2013 Protecting Enterprise Systems [Whitepaper]. Webroot Software Inc., USA (2007)"},{"key":"15_CR2","unstructured":"Electronista. LulzSec hacks Sony Pictures, reveals 1m passwords unguarded. Electronista Media Inc. (June 2, 2011)"},{"key":"15_CR3","unstructured":"Measuring Website Security: Windows of Exposure. WhiteHat Website Security Statistic Report (March 14, 2011)"},{"key":"15_CR4","unstructured":"Shanmughaneethi, V., Yagna Pravin, R., Emilin Shyni, C., Swamynathan, S.: SQLIVD - AOP: Preventing SQL Injection"},{"key":"15_CR5","unstructured":"OWASP (Open Source Web Application Security Project). OWASP Top 10 \u2013 2010 Edition. OWASP Foundation (2010)"},{"key":"15_CR6","unstructured":"Fortify Source Code Analyzer \u2013 Capabilities. HP Fortify. Web (2011)"},{"key":"15_CR7","unstructured":"Laddad, R.: AOP @ Work: AOP Myths & Realities. IBM Developer Works (February 14, 2006)"},{"key":"15_CR8","unstructured":"ESAPI Interface Encoder. The Open Web Application Security Project. Web (2011)"},{"key":"15_CR9","unstructured":"ESAPI Validator Library. The Open Web Application Security Project. Web (2011)"},{"key":"15_CR10","unstructured":"Li, S.: AOP: Patching in the 21st Century. Developer Fusion. Web (July 23, 2010)"},{"key":"15_CR11","unstructured":"Bostrom, G.: Database Encryption as an Aspect. In: Proceedings of AOSD 2004 Workshop on AOSD Technology for Application level Security (March 2004)"},{"key":"15_CR12","unstructured":"Laney, R., van der Linden, J., Thomas, P.: Evolution of Aspects for Legacy System Security Concerns. In: Proceedings of AOSD 2004 Workshop on AOSD Technology for Application level Security (March 2004)"},{"key":"15_CR13","unstructured":"Huang, M., Wang, C., Zhang, L.: Toward a Reusable and Generic Security Aspect Library. In: Proceedings of AOSD 2004 Workshop on AOSD Technology for Application level Security (March 2004)"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Hermosillo, G., Gomez, R., Seinturier, L., Duchien, L.: Using Aspect Programming to Secure Web Applications. Journal of Software\u00a02(6) (December 2007)","DOI":"10.4304\/jsw.2.6.53-63"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Clarke, J.: SQL Injection Attacks and Defense, 1st edn. Syngress (May 13, 2009) (March 1, 2011)","DOI":"10.1016\/B978-1-59749-424-3.00001-3"},{"key":"15_CR16","unstructured":"Mece, E., Kodra, L.: Towards full protection of Web Applications based on Aspect Oriented Programming. GJCST, 33\u201337 (2012)"},{"key":"15_CR17","unstructured":"Arthur, C.: Twitter users including Sarah Brown hit by malicious hacker attack. Guardian News (September 21, 2010)"},{"key":"15_CR18","unstructured":"Win, B., Shah, V., Joosen, W., Bodkin, R. (eds.): AOSDSEC: AOSD Technology for Application-Level Security (March 2004)"},{"key":"15_CR19","unstructured":"Bodkin, R.: Enterprise Security Aspects. In: Win, B., Shah, V., Joosen, W., Bodkin, R. (eds.) AOSDSEC: AOSD Technology for Application-Level Security (March 2004)"},{"key":"15_CR20","unstructured":"Fortify. Leading Bank Turns Security into a Differentiator with Fortify SCA. Fortify Software Inc. (2008)"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Feathers, M.: Working Effectively with Legacy Code. Prentice Hall (2004)","DOI":"10.1007\/978-3-540-27777-4_42"},{"key":"15_CR22","unstructured":"Higgins, K.J.: The Cost of Fixing an Application Vulnerability. Security Dark Reading (May 11, 2009), \n                    \n                      http:\/\/www.darkreading.com\/security\/news\/"},{"issue":"5","key":"15_CR23","doi-asserted-by":"publisher","first-page":"865","DOI":"10.1016\/j.infsof.2008.05.007","volume":"51","author":"Z.J. Zhu","year":"2009","unstructured":"Zhu, Z.J., Zulkernine, M.: A model-based aspect-oriented framework for building intrusion-aware software systems. Information and Software Technology\u00a051(5), 865\u2013875 (2009)","journal-title":"Information and Software Technology"},{"key":"15_CR24","unstructured":"Serme, G., De Oliveira, A.S., Guarnieri, M., El Khoury, P.: Towards Assisted Remediation of Security Vulnerabilities. In: 6th International Conference on Emerging Security Information, Systems and Technologies (August 2012)"}],"container-title":["Lecture Notes in Computer Science","Engineering Secure Software and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36563-8_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T07:10:29Z","timestamp":1557558629000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36563-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642365621","9783642365638"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36563-8_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}