บทที่ 1
ABSTRACT
1. INTRODUCTION
2. RELATEDWORK
3. TECHNIQUE
3.1 Example of SQL Injection Attack
3.2 Proposed Approach
3.3 Considerations on the Technique
4. EVALUATION
4.1 The Tool
4.2 Experiment Setup
4.3 Results
5. CONCLUSION AND FUTUREWORK
*Acknowledgments
6. REFERENCES
บทที่ 2
ABSTRACT
1. INTRODUCTION
2. BACKGROUND: SQL INJECTION
2.1 Web Server Technology
2.2 SQL Injection Defined
2.3 SQL Injection Techniques
2.4 Mass SQL InjectionDiscovery Techniques
3. SQL PARSE TREE VALIDATION
3.1 Dynamic Queries
3.2 Comment Token Inclusion
3.3 Implementation
3.4 Correctness
4. CASE STUDY
4.1 Execution Overhead
4.2 Ease of Use
5. RELATEDWORK
6. CONCLUSION
7. REFERENCES
บทที่ 3
Abstract
1. Introduction
2. Overview of Approach
3. Formal Descriptions
3.1 Problem Formalization
3.2 Algorithm
3.3 Correctness
4. Applications
4.1 Cross Site Scripting
4.2 XPath Injection
4.3 Shell Injection
5. Implementation
6. Evaluation
6.1 Evaluation Setup
6.2 Results
6.3 Discussions
7. RelatedWork
7.1 Input Filtering Techniques
7.2 Syntactic Structure Enforcement
7.3 Static and Runtime Checking
7.4 Meta-Programming
Acknowledgments
References
บทที่ 4
ABSTRACT
1. INTRODUCTION
2. BACKGROUND ON SQLIAS
2.1 Injection Mechanisms
2.2 Attack Intent
3. EXAMPLE APPLICATION
4. SQLIA TYPES
5. PREVENTION OF SQLIAS
5.1 Defensive Coding Practices
5.2 Detection and Prevention Techniques
6. TECHNIQUES EVALUATION
6.1 Evaluation with Respect to Attack Types
6.2 EvaluationwithRespect to InjectionMechanisms
6.3 Evaluation with Respect to Deployment
Requirements
6.4 Evaluation of PreventionFocused
Techniques
with Respect to Defensive Coding
Practices
7. CONCLUSION
*Acknowledgements*
8. REFERENCES
บทที่ 5
Abstract
1. Introduction
2 SQL-Injection in Stored Procedures
3 Related Work
4 Our Proposed Solution
5 Prototype Evaluation
6 Conclusions and FutureWork
References