Cited By
View all- Hafiz MOverbey JLeavens G(2012)OpenRefactory/CProceedings of the 3rd annual conference on Systems, programming, and applications: software for humanity10.1145/2384716.2384730(27-28)Online publication date: 19-Oct-2012
Topping the list of the most prominent attacks on applications [6] are various types of injection attacks. Malicious inputs that cause injection attacks are numerous; programmers fail to write checks for all attack patterns. We define a program ...
Programs are implemented in a variety of languages and contain serious vulnerabilities which might be exploited to cause security breaches. These vulnerabilities have been exploited in real life and caused damages to related stakeholders such as program ...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in