{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T21:28:15Z","timestamp":1774128495115,"version":"3.50.1"},"reference-count":16,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2020,5,1]]},"DOI":"10.1587\/transinf.2019edl8143","type":"journal-article","created":{"date-parts":[[2020,4,30]],"date-time":"2020-04-30T22:13:49Z","timestamp":1588284829000},"page":"1173-1176","source":"Crossref","is-referenced-by-count":12,"title":["Detection of SQL Injection Vulnerability in Embedded SQL"],"prefix":"10.1587","volume":"E103.D","author":[{"given":"Young-Su","family":"JANG","sequence":"first","affiliation":[{"name":"Korea Polytechnics"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] OWASP TOP 10 - https:\/\/www.owasp.org\/index.php\/Top_10-2017_Top_10, 2019."},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] A.K. Dalai and S.K. Jena, \u201cNeutralizing SQL injection attack using server side code modification in web applications,\u201d Security and Communication Networks, vol.2017, pp.1-12, 2017. 10.1155\/2017\/3825373","DOI":"10.1155\/2017\/3825373"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] T. Ye, L. Zhang, L. Wang, and X. Li, \u201cAn empirical study on detecting and fixing buffer overflow bugs,\u201d ICST IEEE Int. Conf., pp.91-101, 2016. 10.1109\/icst.2016.21","DOI":"10.1109\/ICST.2016.21"},{"key":"4","doi-asserted-by":"publisher","unstructured":"[4] P. Bisht, P. Madhusudan, and V.N. Venkatakrishnan, \u201cCANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks,\u201d ACM Trans. Info. Syst. Security, vol.13, no.2, pp.1-38, 2010. 10.1145\/1698750.1698754","DOI":"10.1145\/1698750.1698754"},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] H.K. Brar and P.J. Kaur, \u201cComparing detection ratio of three static analysis tools,\u201d Int. Journal of Computer Applications, vol.124, no.13, pp.35-40, 2015. 10.5120\/ijca2015905749","DOI":"10.5120\/ijca2015905749"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] P. Soulier, D. Li, and J. Williams, \u201cA survey of language-based approaches to cyber-physical and embedded system development,\u201d Tsinghua Science and Technology, vol.20, no.2, pp.130-141, 2015. 10.1109\/tst.2015.7085626","DOI":"10.1109\/TST.2015.7085626"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] D.A. Plaisted, \u201cSource-to-source translation and software engineering,\u201d J. Softw. Eng. Appl., vol.6, no.4A, pp.30-40, 2013. 10.4236\/jsea.2013.64a005","DOI":"10.4236\/jsea.2013.64A005"},{"key":"8","unstructured":"[8] L.A.B. Sanguino and R. Uetz, \u201cSoftware vulnerability analysis using CPE and CVE,\u201d arXiv preprint arXiv, 1705.05347, 2017."},{"key":"9","doi-asserted-by":"publisher","unstructured":"[9] Y.-S. Jang and J.-Y. Choi, \u201cAutomatic prevention of buffer overflow vulnerability using candidate code generation,\u201d IEICE Trans. Inf. &amp; Syst., vol.E101-D, no.12, pp.3005-3018, 2018. 10.1587\/transinf.2018edp7192","DOI":"10.1587\/transinf.2018EDP7192"},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] Y.-S. Jang and J.-Y. Choi, \u201cDetecting SQL injection attacks using query result size,\u201d Comput. Sec., vol.44, pp.104-118, 2014. 10.1016\/j.cose.2014.04.007","DOI":"10.1016\/j.cose.2014.04.007"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] M. Chilowica, E. Duris, and G. Roussel, \u201cSyntax tree fingerprinting for source code similarity detection,\u201d 2009 IEEE 17th Int. Conf. on Program Comprehension, pp.243-247, 2009. 10.1109\/icpc.2009.5090050","DOI":"10.1109\/ICPC.2009.5090050"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] M. Boekhold, I. Karkowski, and H. Corporaal, \u201cTransforming and parallelizing ANSI C programs using pattern recognition,\u201d In int. Conf. on High-Performance Computing and Networking, vol.1593, pp.673-682, 2006. 10.1007\/bfb0100628","DOI":"10.1007\/BFb0100628"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] M. Akmal, I. Allison, and H. Gonzalez-Velez, \u201cAssembling cloud-based geographic information systems: A pragmatic approach using off-the-shelf components,\u201d Cloud Computing with e-Science Applications, pp.141-162, 2015.","DOI":"10.1201\/b18021-7"},{"key":"14","doi-asserted-by":"publisher","unstructured":"[14] V. Kuznetsov, J. Kinder, S. Bucur, and G. Candea, \u201cEfficient state merging in symbolic execution,\u201d ACM SIGPLAN Notices, vol.47, no.6, pp.193-204, 2012. 10.1145\/2345156.2254088","DOI":"10.1145\/2345156.2254088"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] P. Zhang, Practical Guide for Oracle SQL, T-SQL and MySQL, CRC Press, 2017.","DOI":"10.1201\/9781315101873"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] E. Verbitskaia, S. Grigorev, and D. Avdyukhin, \u201cRelaxed parsing of regular approximations of string-embedded languages,\u201d In Int. Conf. on Perspectives of System Informatics, vol.9609, pp.291-302, 2016. 10.1007\/978-3-319-41579-6_22","DOI":"10.1007\/978-3-319-41579-6_22"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/5\/E103.D_2019EDL8143\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,7]],"date-time":"2020-05-07T06:38:40Z","timestamp":1588833520000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/5\/E103.D_2019EDL8143\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,1]]},"references-count":16,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2019edl8143","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,5,1]]}}}