Lethality of SQL injection against current and future Internet-technologies
SQL Injection attack is often used as the underlying technology for hacking, which has made significant number of news headlines in the recent years. A vast majority of the readers do not have a clear idea how SQL Injection attack is used for hacking. In this article, we analyze this technology from...
Saved in:
Main Authors: | Pathan, Al-Sakib Khan, Diallo, Abdoulaye Kindy |
---|---|
Format: | Article |
Language: | English English |
Published: |
Inderscience Publishers, Switzerland
2014
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/25384/4/X_PATHAN.pdf http://irep.iium.edu.my/25384/7/25384_Lethality%20of%20SQL%20injection%20against%20current%20and%20future%20Internet-technologies_SCOPUS.pdf http://irep.iium.edu.my/25384/ http://www.inderscience.com/info/ingeneral/forthcoming.php?jcode=ijcse |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A detailed survey on various aspects of SQL Injection: vulnerabilities, innovative attacks, and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011) -
A walk through SQL injection: vulnerabilities, attacks, and countermeasures in current and future networks
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013) -
A Survey on SQL injection: vulnerabilities, attacks, and prevention techniques
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011) -
A detailed survey on various aspects of SQL injection in web applications: vulnerabilities, innovative attacks and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013) -
SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks
by: Mat Ali, Abdul Bashah, et al.
Published: (2011)