Please use this identifier to cite or link to this item: https://idr.nitk.ac.in/jspui/handle/123456789/6624
Full metadata record
DC FieldValueLanguage
dc.contributor.authorChandrashekhar, R.-
dc.contributor.authorMardithaya, M.-
dc.contributor.authorSanthi Thilagam, P.-
dc.contributor.authorSaha, D.-
dc.date.accessioned2020-03-30T09:45:55Z-
dc.date.available2020-03-30T09:45:55Z-
dc.date.issued2012-
dc.identifier.citationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2012, Vol.7135 LNCS, , pp.524-533en_US
dc.identifier.urihttps://idr.nitk.ac.in/jspui/handle/123456789/6624-
dc.description.abstractSQL Injection Attacks have been around for over a decade and yet most web applications being deployed today are vulnerable to it. The bottom line is that the web has made it easy for new developers to develop web applications without concerning themselves with the security flaws, and that SQL Injection is thought to be a simple problem with a very simple remedy. To truly bring security to the masses, we propose a classification that not only enumerates but also categorizes the various attack methodologies, and also the testing frameworks and prevention mechanisms. We intend our classification to help understand the state of the art on both sides of the fields to lay the groundwork for all future work in this area. � 2012 Springer-Verlag.en_US
dc.titleSQL injection attack mechanisms and prevention techniquesen_US
dc.typeBook chapteren_US
Appears in Collections:2. Conference Papers

Files in This Item:
File Description SizeFormat 
6624.pdf192.84 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.