{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T19:32:12Z","timestamp":1730316732774,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,3,28]],"date-time":"2014-03-28T00:00:00Z","timestamp":1395964800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,3,28]]},"DOI":"10.1145\/2638404.2638457","type":"proceedings-article","created":{"date-parts":[[2014,11,26]],"date-time":"2014-11-26T15:45:24Z","timestamp":1417016724000},"page":"1-6","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Measuring the effectiveness of output filtering against SQL injection attacks"],"prefix":"10.1145","author":[{"suffix":"II","given":"Mark E.","family":"Fioravanti","sequence":"first","affiliation":[{"name":"Florida Institute of Technology, Melbourne, FL"}]},{"given":"Liam M.","family":"Mayron","sequence":"additional","affiliation":[{"name":"Florida Institute of Technology, Melbourne, FL"}]}],"member":"320","published-online":{"date-parts":[[2014,3,28]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"The ten most critical web application security vulnerabilities","author":"WASP","year":"2004","unstructured":"O WASP top 10 2004 : The ten most critical web application security vulnerabilities . OWASP Foundation , 1(5):8, April 2004 . OWASP top 10 2004: The ten most critical web application security vulnerabilities. OWASP Foundation, 1(5):8, April 2004."},{"key":"e_1_3_2_1_2_1","unstructured":"Pangolin v3.2.4 user guide Jan 2011. Pangolin v3.2.4 user guide Jan 2011."},{"key":"e_1_3_2_1_3_1","unstructured":"Havij advanced SQL injection 2012. Havij advanced SQL injection 2012."},{"volume-title":"June","year":"2013","key":"e_1_3_2_1_4_1","unstructured":"Common attack pattern enumeration and classification (CAPEC)-66 : SQL injection, version 2.1 , June 2013 . Common attack pattern enumeration and classification (CAPEC)-66: SQL injection, version 2.1, June 2013."},{"volume-title":"June","year":"2013","key":"e_1_3_2_1_5_1","unstructured":"Common attack pattern enumeration and classification (CAPEC)-7 : Blind SQL injection, version 2.1 , June 2013 . Common attack pattern enumeration and classification (CAPEC)-7: Blind SQL injection, version 2.1, June 2013."},{"volume-title":"July","year":"2013","key":"e_1_3_2_1_6_1","unstructured":"Common weakness enumeration (CWE)-89 : Improper neutralization of special elements used in an SQL command ('SQL injection'), version 2.5 , July 2013 . Common weakness enumeration (CWE)-89: Improper neutralization of special elements used in an SQL command ('SQL injection'), version 2.5, July 2013."},{"key":"e_1_3_2_1_7_1","volume-title":"WASC threat classification: Sql injection. Technical report","author":"Barnett R.","year":"2010","unstructured":"R. Barnett . WASC threat classification: Sql injection. Technical report , Web Application Security Consortium , June 2010 . R. Barnett. WASC threat classification: Sql injection. Technical report, Web Application Security Consortium, June 2010."},{"key":"e_1_3_2_1_8_1","volume-title":"IPCCC 2007","author":"Bertino E.","year":"2007","unstructured":"E. Bertino , A. Kamra , and J. P. Early . Profiling database application to detect SQL injection attacks. In Performance, Computing, and Communications Conference, 2007 . IPCCC 2007 . IEEE International, pages 449--458 , 2007 . E. Bertino, A. Kamra, and J. P. Early. Profiling database application to detect SQL injection attacks. In Performance, Computing, and Communications Conference, 2007. IPCCC 2007. IEEE International, pages 449--458, 2007."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24852-1_21"},{"key":"e_1_3_2_1_10_1","unstructured":"S. M. Christey. 2010 CWE\/SANS top 25 most dangerous software errors. 2010. S. M. Christey. 2010 CWE\/SANS top 25 most dangerous software errors. 2010."},{"key":"e_1_3_2_1_11_1","unstructured":"S. M. Christey. 2011 CWE\/SANS top 25 most dangerous software errors. 2011. S. M. Christey. 2011 CWE\/SANS top 25 most dangerous software errors. 2011."},{"key":"e_1_3_2_1_12_1","unstructured":"C. Cochin. SQLiX 2006. C. Cochin. SQLiX 2006."},{"key":"e_1_3_2_1_13_1","volume-title":"SQLmap user's guide","author":"Damele B.","year":"2013","unstructured":"B. Damele and S. M. SQLmap user's guide , 2013 . B. Damele and S. M. SQLmap user's guide, 2013."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2007.43"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101935"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the IEEE International Symposium on Secure Software Engineering","author":"Halfond W. G. J.","year":"2006","unstructured":"W. G. J. Halfond , J. Viegas , and A. Orso . A classification of SQL-injection attacks and countermeasures . In Proceedings of the IEEE International Symposium on Secure Software Engineering , Arlington, VA, USA, pages 13--15 , 2006 . W. G. J. Halfond, J. Viegas, and A. Orso. A classification of SQL-injection attacks and countermeasures. In Proceedings of the IEEE International Symposium on Secure Software Engineering, Arlington, VA, USA, pages 13--15, 2006."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2012.31"},{"issue":"5","key":"e_1_3_2_1_18_1","first-page":"8","article-title":"OWASP top 10 2007: The ten most critical web application security vulnerabilities","volume":"1","author":"Stock A.","year":"2007","unstructured":"A. Stock , J. Williams , and D. Wichers . OWASP top 10 2007: The ten most critical web application security vulnerabilities . OWASP Foundation , 1 ( 5 ): 8 , April 2007 . A. Stock, J. Williams, and D. Wichers. OWASP top 10 2007: The ten most critical web application security vulnerabilities. OWASP Foundation, 1(5):8, April 2007.","journal-title":"OWASP Foundation"},{"key":"e_1_3_2_1_19_1","volume-title":"Classification of SQL injection attacks","author":"Sun S.-T.","year":"2007","unstructured":"S.-T. Sun , T. H. Wei , S. Liu , and S. Lau . Classification of SQL injection attacks . University of British Columbia , Term Project , 2007 . S.-T. Sun, T. H. Wei, S. Liu, and S. Lau. Classification of SQL injection attacks. University of British Columbia, Term Project, 2007."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.08.002"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASWEC.2006.40"},{"key":"e_1_3_2_1_22_1","volume-title":"December","author":"Wichers D.","year":"2012","unstructured":"D. Wichers , J. Manico , and M. Seil . SQL injection prevention cheat sheet , December 2012 . D. Wichers, J. Manico, and M. Seil. SQL injection prevention cheat sheet, December 2012."},{"issue":"5","key":"e_1_3_2_1_23_1","first-page":"8","article-title":"OWASP top 10 2010: The ten most critical web application security vulnerabilities","volume":"1","author":"Williams J.","year":"2010","unstructured":"J. Williams and D. Wichers . OWASP top 10 2010: The ten most critical web application security vulnerabilities . OWASP Foundation , 1 ( 5 ): 8 , April 2010 . J. Williams and D. Wichers. OWASP top 10 2010: The ten most critical web application security vulnerabilities. OWASP Foundation, 1(5):8, April 2010.","journal-title":"OWASP Foundation"},{"issue":"5","key":"e_1_3_2_1_24_1","first-page":"8","article-title":"OWASP top 10 2013: The ten most critical web application security risks","volume":"1","author":"Williams J.","year":"2013","unstructured":"J. Williams and D. Wichers . OWASP top 10 2013: The ten most critical web application security risks . OWASP Foundation , 1 ( 5 ): 8 , April 2013 . J. Williams and D. Wichers. OWASP top 10 2013: The ten most critical web application security risks. OWASP Foundation, 1(5):8, April 2013.","journal-title":"OWASP Foundation"}],"event":{"name":"ACM SE '14: ACM Southeast Regional Conference 2014","acronym":"ACM SE '14","location":"Kennesaw Georgia"},"container-title":["Proceedings of the 2014 ACM Southeast Regional Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2638404.2638457","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,14]],"date-time":"2023-01-14T02:38:53Z","timestamp":1673663933000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2638404.2638457"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,28]]},"references-count":24,"alternative-id":["10.1145\/2638404.2638457","10.1145\/2638404"],"URL":"https:\/\/doi.org\/10.1145\/2638404.2638457","relation":{},"subject":[],"published":{"date-parts":[[2014,3,28]]},"assertion":[{"value":"2014-03-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}