|
[1] OWASP,“Top Ten 2017”,https://owasp.org/www-project-top-ten/A1_2017-Injection [2] OWASP,“Top Ten 2021”, https://owasp.org/Top10/ [3] CWE, “2021 CWE Top 25 Most Dangerous Software Weaknesses”, https://cwe.mitre.org/ top25/archive/2021/2021_cwe_top25.html [4] Chad Dougherty, “Practical Identification of SQL Injection Vulnerabilities”, Carnegie Mellon University. Produced for US-CERT, a government organization,2012 [5] Zainab S. Alwan and Manal F. Younis, “Detection and Prevention of SQL Injection Attack: A Survey”, International Journal of Computer Science and Mobile Computing,2017 [6] Subhranil Som, Sapna Sinha and Ritu Kataria, “STUDY ON SQL INJECTION ATTACKS: MODE,DETECTION AND PREVENTION”, International Journal of Engineering Applied Sciences and Technology,2016 [7] OWASP, “SQL Injection”, https://owasp.org/www-community/attacks/SQL_Injection [8] ZHAI Bao-feng, “Analysis and Prevention of SQL Injection Attack”, Journal of Liaoning University of Technology(Natural Science Edition),2021 [9] Limei Ma and Yijun Gao, “Research on SQL Injection Attack and Prevention Technology Based on Web”, International Conference on Computer Network, Electronic and Automation (ICCNEA),2019 [10] William G.J. Halfond, Jeremy Viegas, and Alessandro Orso, “A Classification of SQL Injection Attacks and Countermeasures”, College of Computing Georgia Institute of Technology,2006 [11] Juhi Gupta and Ruchi Singhal, “SQL Injections-A threat to Web Applications”,International Journal of Research in Computer Science,2015 [12] Diallo Abdoulaye Kindy and Al-Sakib Khan Pathan, “A SURVEY ON SQL INJECTION: VULNERABILITIES, ATTACKS, AND PREVENTION TECHNIQUES”, IEEE 15th International Symposium on Consumer Electronics,2011 [13] Amirmohammad Sadeghian, Mazdak Zamani, Shahidan M. Abdullah, “ A taxonomy of SQL Injection Attacks”, International Conference on Informatics and Creative Multimedia,2013 [14] Shubham Mukherjee and Sudeshna Bora, “SQL Injection: A Sample Review”, 6th ICCCNT, 2015 [15] Justin Clarke Paperback, “SQL Injection Attacks and Defense 2nd”, Syngress,2012 [16] bWAPP, “Home”, http://www.itsecgames.com/ [17] DVWA,“ Damn Vulnerable Web Application” , https://dvwa.co.uk/ [18] Sqlmap,“Sqlmap” , https://sqlmap.org/ [19] Jsql,“Jsql-injection”,https://github.com/ron190/jsql-injection [20] Sqlsus,“Sqlsus”, http://sqlsus.sourceforge.net/ [21] Qayyum Shaheer,“Havij”, https://dekisoft.com/havij-download-2021/#Havij_Free_ Download_ 2021_Latest_8211_1_SQL_Injection_Attack_Tool [22] Mohd Shakir Zakaria, “How to log POST request data in Apache”, https://www.simplified.guide/apache/log-post
|