Zobrazeno 1 - 10
of 23
pro vyhledávání: '"Jan-Min Chen"'
Autor:
Jan-Min Chen, 陳建民
98
Injection flaw results from invalidated input so proper input validation is an effective countermeasure to protect against injection attack. Some programs are poorly written, lacking even the most basic security procedures for sanitizing inpu
Injection flaw results from invalidated input so proper input validation is an effective countermeasure to protect against injection attack. Some programs are poorly written, lacking even the most basic security procedures for sanitizing inpu
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/69583889921599411773
Publikováno v:
Journal of Discrete Mathematical Sciences and Cryptography. 13:17-27
Nowadays the trend of the Web application attack is using various vulnerability scanners to find flaws before launching attacks. Examples of such vulnerabilities are SQL injection and Cross-Site Scripting (XSS). Most of the web application security p
Autor:
Jan-Min Chen
Publikováno v:
Cyberspace Safety and Security ISBN: 9783319035833
CSS
CSS
Nowadays Web robots can be used to perform a number of useful navigational goals, such as statistical analysis, link check, and resource collection. On one hand, Web crawler is a particular group of users whose traverse should not make part of regula
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0fedb9d1b54aebc4aba51334001d54e4
https://doi.org/10.1007/978-3-319-03584-0_1
https://doi.org/10.1007/978-3-319-03584-0_1
Autor:
Jan-Min Chen
Publikováno v:
Advanced Research on Electronic Commerce, Web Application, and Communication ISBN: 9783642203695
An injection flaw is the result of an invalidated input. Some input validation programs are poorly written, lacking even the most basic security procedures for constraining input. Enforcing proper input validation is an effective countermeasure to us
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1b62d90e7e3c68d1575c7afd2c2c52e6
https://doi.org/10.1007/978-3-642-20370-1_26
https://doi.org/10.1007/978-3-642-20370-1_26
Publikováno v:
2010 International Computer Symposium (ICS2010).
This article introduced a model which applies game theory and cost to assess the security level of a web application. A system administrator may assess security level and the cost of defending upon this model. Afterward, he may apply game theory to f
Autor:
Chia-Lun Wu, Jan-Min Chen
Publikováno v:
2010 International Computer Symposium (ICS2010).
As the popularity of the web increases and web applications become tools of everyday use, the role of web security has been gaining importance as well. The last years have shown a significant increase in the number of web-based attacks. Too many noun
Autor:
Jin-Cherng Lin, Jan-Min Chen
Publikováno v:
Journal of Computers. 4
Numbers of the programs are poorly written, lacking even the most basic security procedures for handling input data from users. The input validation vulnerability can be detected by many tools but few tools can fix the flaws automatically. The securi
Publikováno v:
SSIRI
The interactive behavior between the hacker and the defender is similar to information warfare. The process of attack and defend can be abstracted as a tree diagram and analyzed based on game theory. When a hacker launches an attack, he must do his b
Publikováno v:
ICYCS
According to OWASP Top 10 2007, top 1-5 critical Web application security vulnerabilities caused by unchecked input [1]. Unvalidated Input may lead hacker to inject code to bypass or modify the originally intended functionality of the program to gain
Publikováno v:
AINA Workshops
Injection attack is a technique to bypass or modify the originally intended functionality of the program. Many application's security vulnerabilities result from generic injection problems. Examples of such vulnerabilities are SQL injection, shell in