![]() Shar, Lwin Khin ![]() in IEEE Computer (2013), 46(3), 69-77 The best strategy for combating SQL injection, which has emerged as the most widespread website security risk, calls for integrating defensive coding practices with both vulnerability detection and ... [more ▼] The best strategy for combating SQL injection, which has emerged as the most widespread website security risk, calls for integrating defensive coding practices with both vulnerability detection and runtime attack prevention methods. [less ▲] Detailed reference viewed: 134 (3 UL)![]() Shar, Lwin Khin ![]() in IEEE Computer (2012), 45(3), 55-62 Researchers have proposed multiple solutions to cross-site scripting, but vulnerabilities continue to exist in many Web applications due to developers’ lack of understanding of the problem and their ... [more ▼] Researchers have proposed multiple solutions to cross-site scripting, but vulnerabilities continue to exist in many Web applications due to developers’ lack of understanding of the problem and their unfamiliar- ity with current defenses’ strengths and limitations. [less ▲] Detailed reference viewed: 134 (2 UL) |
||