Eliminating SQL injection and cross site scripting using aspect oriented programming

B Simic, J Walden - … Symposium on Engineering Secure Software and …, 2013‏ - Springer
Security vulnerabilities in the web applications that we use to shop, bank, and socialize
online expose us to exploits that cost billions of dollars each year. This paper describes the …

PXpathV: preventing XPath injection vulnerabilities in web applications

V Shanmughaneethi - … Journal on Web service Computing (IJWSC …, 2011‏ - papers.ssrn.com
Generally, most Web applications use relational databases to store and retrieve information.
But, the growing acceptance of XML technologies for documents it is logical that security …

CIVD: detection of command injection vulnerabilities in web services through aspect–oriented programming

V Shanmughaneethi, RY Praveen… - … journal of computer …, 2012‏ - inderscienceonline.com
Most internet applications are providing facilities through the web services. Due to its wide
usage, these web services are exposed to severe vulnerabilities that can be uncovered and …

SQLIVD-AOP: Preventing SQL Injection Vulnerabilities Using Aspect Oriented Programming through Web Services

V Shanmughaneethi, RY Pravin, CE Shyni… - … Architecture and Grid …, 2011‏ - Springer
Security remains a major threat to the entire Web for many kinds of transactions. Most of the
threats are created through application level vulnerabilities and have been exploited with …

Designing Security Properties-Centric Communication Protocols using a Component-Based Approach

N Nobelis, K Boudaoud, C Delettre… - International Journal of …, 2012‏ - igi-global.com
Numerous communication protocols have been designed offering a set of security properties
through the use of cryptographic tools to secure electronic document transfer. However …

A component-based approach to security protocol design

N Nobelis, K Boudaoud, C Delettre… - 2011 IEEE Workshops …, 2011‏ - ieeexplore.ieee.org
Electronic document transfer is a key operation in many of today's most important
applications (workflow, e-commerce, etc.). Each of these applications requires different …

XIVD: Runtime detection of XPath injection vulnerabilities in XML databases through aspect oriented programming

V Shanmughaneethi, RY Pravin… - … Conference on Advances …, 2011‏ - Springer
The growing acceptance of XML technologies for documents and protocols, it is logical that
security should be integrated with XML solutions. In a web application, an improper user …

[ספר][B] Eliminating SQL Injection and Cross-Site Scripting With Aspect Oriented Programming

B Simic - 2012‏ - search.proquest.com
Cross Site scripting (XSS) and SQL injection are two of the most common vulnerabilities
found in applications. According to a study done by the Web Application Security …

[ספר][B] Efficient Runtime Security System for Decentralised Distributed Systems

AA Thulnoon - 2018‏ - search.proquest.com
Distributed systems can be defined as systems that are scattered over geographical
distances and provide different activities through communication, processing, data transfer …

یک طبقه‌بندی از حملات تزریق SQL و روش‌های دفاع از این حملات در پدافند غیرعامل

ترابی, شهیدی نژاد - پدافند غیرعامل, 2018 - pd.ihu.ac.ir
حملات تزریق SQL، یک تهدید امنیتی جدی برای برنامه‌های کاربردی تحت وب در فضای سایبری
می‌باشند. حملات تزریق SQL، به مهاجمان اجازه می‌دهند تا دسترسی نامحدود به پایگاه داده‌ای که برنامه …