|
參考文獻
[1] Abdulkader A. Alfantookh,”An Automated Universal Server Level Solution For SQL Injection Security Flaw”,IEEE Conference,2004. [2] Gregory T. Buehrer, Bruce W. Weide, Paolo A. G. Sivilotti,“Using Parse Tree Validation to Prevent SQL Injection Attacks”, ACM 1595932044/05/09,Sep 2005. [3] Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung Tsai, D. T. Lee, Sy-Yen Kuo,“Securing Web Application Code By Static Analysis and Runtime Protection”,ACM 1-58113-844-X/04/0005, May 2004. [4] Shu Wenhui, Tan T H, Daniel, “A Novel Intrusion Detection System Model for Securing Web-based Database Systems”,IEEE Conference,2001. [5] William G.J. Halfond,Alessandro Orso, “Combining Static Analysis and Runtime Monitoring to Counter SQLInjection Attacks”, Workshop on Dynamic Analysis (WODA 2005),17 May 2005. [6] Yi Hu , Brajendra Panda , “A Data Mining Approach for Database Intrusion Detection” , ACM Symposium on Applied Computing,March 2004. [7] Yi Hu, Brajendra Panda,” Identification of Malicious Transactions in Database Systems”, Proceedings of the Seventh International Database Engineering and Applications Symposium,IEEE Conference,2004. [8] Tatyana Ryutov, Clifford Neuman, Dongho Kim, Li Zhou,”Integrated Access Control and Intrusion Detection for Web Servers”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,September 2003. [9] Chris Anley ,”Advanced SQL Injection In SQL Server Applications”, An NGSSoftware Insight Security Research (NISR) Publication conference, http://www.ngssoftware.com/papers/advanced_sql_ injection.pdf, 2002. [10] Chris Anley ,” (more) Advanced SQL Injection”, An NGSSoftware Insight Security Research (NISR) Publication conference, http://www.nextgenss.com/papers/more_advanced_sql_injection.pdf,June 2002. [11] Kevin Spett,”Blind SQL Injection”,secure protect inspect, www.spidynamics.com/whitepapers/Blind_SQLInjection.pdf [12] Ofer Maor,Amichai Shulman,” SQL Injection Signatures Evasion", Application Defense Center, www.imperva.com/download.asp?id=2, April 2004. [13] Sam Shober, “Testing Web Applications for SQL Injection”, http://www.stickyminds.com/getfile.asp?ot=XML&id=6007&fn=XDD6007filelistfilename1%2Epdf. [14] Kevin Spett ,”SQL Injection”, www.spidynamics.com/whitepapers/WhitepaperSQLInjection.pdf. [15] “The Importance of Web Application Scanning”,Acunetix whitepaper,nov 2005. [16] The Open Web Application Security Project (OWASP), “A Guide to Building Secure Web Applications and Web Services” 2.0 Black Hat Edition,http://landau.dsic.upv.es/pbs/OWASPGuide2.0.1.pdf ,July 2005. [17] The Open Web Application Security Project (OWASP), “The Ten Most Critical Web Application Security Vulnerabilitise” 2.0 Black Hat Edition,http://www.pisa.org.hk/event/OWASP_WebScarab_and_WebGoat.pdf , Jan 2004. [18]John Viega,Matt Messier,Secure Software,”Security is Harder than you Think”, QUEUE,July 2004. [19] TW-CERT,SQL Injection 簡介與相關防護http://www.cert.org.tw/document/column/show.php?key=96. [20] 賴溪松教授,”入侵偵測技術”, http://crypto.ee.ncku.edu.tw/class/network_security/93/Ch8.pdf. [21] 朱瑞狄、賴冠州, “從入侵偵測到入侵防禦”, http://www.broadweb.com/upfiles/tech1087291453.pdf. [22] 曾仲強,賴谷鑫,陳嘉玫,鄭炳強,”以支援向量機為基礎之後門程式入侵偵測” ,國立中山大學資管系, http://neumann.mis.stu.edu.tw/tungsh/Courses/Spring2006/BI/Chi/taai2005-paper-SS2-3.pdf. [23] Yue-Shi Lee, Show-Jane Yen,Chi-Hsuan Lin,“Performance Evaluation on a Classification System”, Department of Computer Science and Information Engineering,Ming Chuan University,” http://jie.soit.mcu.edu.tw/notes/authorguidelines-ch.doc”. [24] 胡百敬,”SQL Injection (資料隱碼)– 駭客的 SQL填空遊戲”,http://www.microsoft.com/taiwan/sql/SQL_Injection_G1.htm. [25] MSDN Library,“ISAPI 篩選常式”, http://msdn.microsoft.com/library/cht/default.asp?url=/library/CHT/vccore/html/_core_isapi_extensions.3a_.filters.asp. [26] 陳勇君,”面對WEB化教務行政,如何蒙其利,避其害”, http://www.jwit.edu.tw/~ccds94/slide/20051117track1-03.pdf
|