[1]OWASP. OWASP Top102010[EB/OL]. http://wenku.baidu.com/view/353d22c75fbfc77da269b1d1.html, 2016-03-31.
[2]Su Zhendong, Wassermann G. The essence of command injection attacks in Web applications[C]// Proceedings of Conference of the 33rd ACM SIGPLANSIGACT Symposium on Principles of Programing Languages(POPL’06). 2006:372-382.
[3]Wassermann G, Su Zhendong. Sound and precise analysis of Web applications for injection vulnerabilities[C]// 2007 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI’07). 2007:32-41.
[4]Jiao Antunes, Nuno Neves, Migue Correia, et al. Vulnerability discovery with attack injection[J]. IEEE Transactions on Software Engineering, 2010,36(3):357-370.
[5]Halfond W G J, Viegas H J, Orso A. A classification of SQL injection attacks and countermeasures[C]// Proc. of International Symposium on Secure Software Engineering. IEEE Press, 2006.
[6]Buehrer G T, Weide B W, Sivilotti P A G. Using parse tree validation to prevent SQL injection attacks[C]// Proceedings of the 5th International Workshop on Software Engineering and Middleware(SEM’05). 2005:106-113.
[7]Angelo Ciampa, Corrado Aaron Visaggio, Massimiliano Di Penta. A heuristicbased approach for detecting SQLinjection vulnerabilities in Web applications[C]// Proceedings of the IEEE 2010 ICSE Workshop on Software Engineering for Secure Systems (ICSE’10). 2010:43-49.
[8]Ismail O, Etoh M, Kadobayashi Y, et al. A proposal and implementation of automatic detection/collection system for crosssite scripting vulnerability[C]// Proceedings of the International Conference on Advanced Information Networking and Applications(AINA’04). 2004:145-151.
[9]Daniel Bates, Adams Barths, Collin Jackson. Regular expression considered harmful in clientside XSS filter[C]// Proceedings of the 19th International World Wide Web Conference(WWW’10). 2010:91-100.
[10]Alkhalaf Muath, Choudhary Shauvik Roy, Fazziniy Mattia, et al. ViewPoints: Differential string analysis for discovering client and serverside input validation inconsistencies[C]// Proceedings of the 2012 International Symposium on Software Testing and Analysis (ISSTA’12). 2012:56-66.
[11]Criscione C, Zanero S. Masibty: An anomaly based intrusion prevention system for Web applications[C]// Black Hat Europe. 2009.
[12]Lam M S, Martin M, Livshits B, et al. Securing Web applications with static and dynamic information flow tracking[C]// Proceedings of the 2008 ACM SIGPLAN Symposium on Partial Evaluation and Semantics based Program Manipulation. 2008:3-12.
[13]Ezumalai R, Aghila G. Combinatorial approach for preventing SQL injection attacks[C]// Proceedings of the IEEE International Conference in Advance Computing. 2009:1212-1217.
[14]Simon Haykin. 神经网络与机器学习[M]. 北京:机械工业出版社, 2009.
[15]Brand R Skari. Bayesian Classiflcation for SQL Injection Detection[D]. University of Wyoming, 2011.
|