{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T21:00:03Z","timestamp":1770066003277,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,5,28]],"date-time":"2006-05-28T00:00:00Z","timestamp":1148774400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,5,28]]},"DOI":"10.1145\/1134285.1134416","type":"proceedings-article","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T16:53:01Z","timestamp":1153759981000},"page":"795-798","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":54,"title":["Preventing SQL injection attacks using AMNESIA"],"prefix":"10.1145","author":[{"given":"William G. J.","family":"Halfond","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology"}]},{"given":"Alessandro","family":"Orso","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2006,5,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24852-1_21"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1108473.1108496"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1760267.1760269"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062488"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/998675.999468"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.21"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101935"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1083246.1083250"},{"key":"e_1_3_2_1_9_1","volume-title":"Proc. of the Intern. Symposium on Secure Software Engineering (ISSSE 2006)","author":"Halfond W. G.","year":"2006","unstructured":"W. G. Halfond , J. Viegas , and A. Orso . A Classification of SQL-Injection Attacks and Countermeasures . In Proc. of the Intern. Symposium on Secure Software Engineering (ISSSE 2006) , Mar. 2006 . W. G. Halfond, J. Viegas, and A. Orso. A Classification of SQL-Injection Attacks and Countermeasures. In Proc. of the Intern. Symposium on Secure Software Engineering (ISSSE 2006), Mar. 2006."},{"key":"e_1_3_2_1_10_1","volume-title":"Writing Secure Code","author":"Howard M.","year":"2003","unstructured":"M. Howard and D. LeBlanc . Writing Secure Code . Microsoft Press , Redmond, Washington , $2^nd$ edition, 2003 . M. Howard and D. LeBlanc. Writing Secure Code. Microsoft Press, Redmond, Washington, $2^nd$ edition, 2003."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775174"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988679"},{"key":"e_1_3_2_1_13_1","volume-title":"Finding Security Vulnerabilities in Java Applications with Static Analysis. In Usenix Security Symposium","author":"Livshits V. B.","year":"2005","unstructured":"V. B. Livshits and M. S. Lam . Finding Security Vulnerabilities in Java Applications with Static Analysis. In Usenix Security Symposium , Aug. 2005 . V. B. Livshits and M. S. Lam. Finding Security Vulnerabilities in Java Applications with Static Analysis. In Usenix Security Symposium, Aug. 2005."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1094811.1094840"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062487"},{"key":"e_1_3_2_1_16_1","volume-title":"Automatically Hardening Web Applications Using Precise Tainting Information. In Twentieth IFIP Intern. Information Security Conf. (SEC 2005)","author":"Nguyen-Tuong A.","year":"2005","unstructured":"A. Nguyen-Tuong , S. Guarnieri , D. Greene , J. Shirley , and D. Evans . Automatically Hardening Web Applications Using Precise Tainting Information. In Twentieth IFIP Intern. Information Security Conf. (SEC 2005) , May 2005 . A. Nguyen-Tuong, S. Guarnieri, D. Greene, J. Shirley, and D. Evans. Automatically Hardening Web Applications Using Precise Tainting Information. In Twentieth IFIP Intern. Information Security Conf. (SEC 2005), May 2005."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/11663812_7"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/511446.511498"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1117696.1117706"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111037.1111070"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/11506881_8"},{"key":"e_1_3_2_1_22_1","first-page":"70","volume-title":"Proc. of the FSE Workshop on Specification and Verification of Component-Based Systems (SAVCBS 2004","author":"Wassermann G.","year":"2004","unstructured":"G. Wassermann and Z. Su . An Analysis Framework for Security in Web Applications . In Proc. of the FSE Workshop on Specification and Verification of Component-Based Systems (SAVCBS 2004 ), pages 70 -- 78 , Oct. 2004 . G. Wassermann and Z. Su. An Analysis Framework for Security in Web Applications. In Proc. of the FSE Workshop on Specification and Verification of Component-Based Systems (SAVCBS 2004), pages 70--78, Oct. 2004."}],"event":{"name":"ICSE06: International Conference on Software Engineering","location":"Shanghai China","acronym":"ICSE06","sponsor":["ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 28th international conference on Software engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1134285.1134416","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1134285.1134416","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:25Z","timestamp":1750259185000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1134285.1134416"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,5,28]]},"references-count":22,"alternative-id":["10.1145\/1134285.1134416","10.1145\/1134285"],"URL":"https:\/\/doi.org\/10.1145\/1134285.1134416","relation":{},"subject":[],"published":{"date-parts":[[2006,5,28]]},"assertion":[{"value":"2006-05-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}