{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T21:39:30Z","timestamp":1753738770140,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,2,22]],"date-time":"2019-02-22T00:00:00Z","timestamp":1550793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,2,22]]},"DOI":"10.1145\/3287324.3287429","type":"proceedings-article","created":{"date-parts":[[2019,2,22]],"date-time":"2019-02-22T22:12:13Z","timestamp":1550873533000},"page":"191-197","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["');DROP TABLE textbooks;--"],"prefix":"10.1145","author":[{"given":"Cynthia","family":"Taylor","sequence":"first","affiliation":[{"name":"Oberlin College, Oberlin, OH, USA"}]},{"given":"Saheel","family":"Sakharkar","sequence":"additional","affiliation":[{"name":"University of Illinois at Chicago, Chicago, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,2,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Learning SQL: Master SQL Fundamentals","author":"Beaulieu A.","year":"2009","edition":"2"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1921607.1921610"},{"key":"e_1_3_2_1_3_1","first-page":"17","volume-title":"Proceedings of the 14th Colloquium for Information Systems Security Education","author":"Chen L.","year":"2010"},{"volume-title":"Proceedings of the 13 Colloquium for Information Systems Security Education (CISSE 2009","year":"2009","author":"Chu B.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","first-page":"2","article-title":"In search of the right database text","volume":"21","author":"Conklin M.","year":"2005","journal-title":"Journal of Computing Sciences in Colleges"},{"key":"e_1_3_2_1_6_1","volume-title":"Database Systems: A Practical Approach to Design, Implementation, and Management","author":"Connolly T.","year":"2014","edition":"6"},{"volume-title":"The History of SQL Injection, the Hack That Will Never Go Away","year":"2015","author":"Cox J.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1348713.1348716"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/2842853"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2790033"},{"volume-title":"Do textbooks dictate the content of mathematics instruction in elementary schools? American educational research journal 26, 3","year":"1989","author":"Freeman D. J.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","volume-title":"Database Systems: The Complete Book","author":"Garcia-Molina H.","year":"2008","edition":"2"},{"volume-title":"All Eyes Are on Russia, 2016","year":"2016","author":"Greenberg A.","key":"e_1_3_2_1_13_1"},{"volume-title":"Learning from curriculum materials: Scaffolds for new teachers? Teaching and teacher education 24, 8","year":"2008","author":"Grossman P.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409908.1409914"},{"key":"e_1_3_2_1_16_1","first-page":"13","volume-title":"Proceedings of the IEEE International Symposium on Secure Software Engineering","volume":"1","author":"Halfond W. G.","year":"2006"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.735847"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2978192.2978225"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2012.54"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/563340.563480"},{"key":"e_1_3_2_1_21_1","first-page":"5","article-title":"Integrating security across the computer science curriculum","volume":"19","author":"Null L","year":"2004","journal-title":"Journal of Computing Sciences in Colleges"},{"volume-title":"Reviewing Code for SQL Injection","year":"2010","author":"OWASP.","key":"e_1_3_2_1_22_1"},{"volume-title":"OWASP Top Ten Project","year":"2017","author":"OWASP.","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/560733"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595496.1562909"},{"key":"e_1_3_2_1_26_1","first-page":"2","article-title":"Designing web labs for teaching security concepts","volume":"25","author":"Schweitzer D.","year":"2009","journal-title":"Journal of Computing Sciences in Colleges"},{"key":"e_1_3_2_1_27_1","first-page":"2","article-title":"A survey on SQL injection attack, detection and prevention techniques","volume":"5","author":"Shegokar A. M.","year":"2014","journal-title":"Int. J. Comput. Sci. Inf. Technol"},{"key":"e_1_3_2_1_28_1","volume-title":"Database System Concepts","author":"Silberschatz A.","year":"2010","edition":"6"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1211351"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2012.6303071"},{"volume-title":"The 50 Best Computer-Science and Engineering Schools in America","year":"2015","author":"Stanger M.","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","unstructured":"Trainer K. Between 35 000 and 40 000 credit cards exposed to hackers after coding errors led to SQL Injection 2016. https:\/\/www.foregenix.com\/blog\/credit-cards-exposed-to-hackers-poor-coding-sql-injection.  Trainer K. Between 35 000 and 40 000 credit cards exposed to hackers after coding errors led to SQL Injection 2016. https:\/\/www.foregenix.com\/blog\/credit-cards-exposed-to-hackers-poor-coding-sql-injection."},{"key":"e_1_3_2_1_33_1","first-page":"483","volume-title":"Proceeding of NISSC 1996 (Oct. 1996","author":"White G.","year":"1996"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1539024.1508954"},{"key":"e_1_3_2_1_35_1","first-page":"4","article-title":"Computer security and impact on computer science education","volume":"16","author":"Yang T. A","year":"2001","journal-title":"Journal of Computing Sciences in Colleges"},{"volume-title":"Proceedings of the 16th Colloquium for Information Systems Security Education","year":"2012","author":"Yuan X.","key":"e_1_3_2_1_36_1"},{"key":"e_1_3_2_1_37_1","first-page":"4","article-title":"Evaluating hands-on labs for teaching sql injection: a comparative study","volume":"32","author":"Yuan X.","year":"2017","journal-title":"Journal of Computing Sciences in Colleges"},{"volume-title":"Answers to Your Burning Questions on the Ashley Madison Hack","year":"2015","author":"Zetter K.","key":"e_1_3_2_1_38_1"},{"volume-title":"Hacker Lexicon: SQL Injections, an Everyday Hacker's Favorite Attack","year":"2016","author":"Zetter K.","key":"e_1_3_2_1_39_1"}],"event":{"name":"SIGCSE '19: The 50th ACM Technical Symposium on Computer Science Education","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"],"location":"Minneapolis MN USA","acronym":"SIGCSE '19"},"container-title":["Proceedings of the 50th ACM Technical Symposium on Computer Science Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3287324.3287429","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3287324.3287429","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:01:55Z","timestamp":1750208515000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3287324.3287429"}},"subtitle":["An Argument for SQL Injection Coverage in Database Textbooks"],"short-title":[],"issued":{"date-parts":[[2019,2,22]]},"references-count":39,"alternative-id":["10.1145\/3287324.3287429","10.1145\/3287324"],"URL":"https:\/\/doi.org\/10.1145\/3287324.3287429","relation":{},"subject":[],"published":{"date-parts":[[2019,2,22]]},"assertion":[{"value":"2019-02-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}