dc.contributor.author | Tirronen, Ville | |
dc.contributor.editor | Lehto, Martti | |
dc.contributor.editor | Neittaanmäki, Pekka | |
dc.date.accessioned | 2018-12-05T12:59:15Z | |
dc.date.available | 2019-05-05T21:35:18Z | |
dc.date.issued | 2018 | |
dc.identifier.citation | Tirronen, V. (2018). Stopping injection attacks with code and structured data. In M. Lehto, & P. Neittaanmäki (Eds.), <i>Cyber Security : Power and Technology</i> (pp. 219-231). Springer. Intelligent Systems, Control and Automation : Science and Engineering, 93. <a href="https://doi.org/10.1007/978-3-319-75307-2_13" target="_blank">https://doi.org/10.1007/978-3-319-75307-2_13</a> | |
dc.identifier.other | CONVID_28046354 | |
dc.identifier.other | TUTKAID_77604 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/60508 | |
dc.description.abstract | Injection attacks top the lists of the most harmful software vulnerabilities. Injection vulnerabilities are both commonplace and easy to exploit, which makes development of injection protection schemes important. In this article, we show how injection attacks can be practically eliminated through the use of structured data paired with cryptographic verification codes upon transmission. | fi |
dc.format.extent | 288 | |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Springer | |
dc.relation.ispartof | Cyber Security : Power and Technology | |
dc.relation.ispartofseries | Intelligent Systems, Control and Automation : Science and Engineering | |
dc.rights | In Copyright | |
dc.subject.other | XSS | |
dc.subject.other | injection | |
dc.subject.other | SQL injection | |
dc.subject.other | proof-carrying code | |
dc.subject.other | cryptographic hash | |
dc.title | Stopping injection attacks with code and structured data | |
dc.type | bookPart | |
dc.identifier.urn | URN:NBN:fi:jyu-201811264868 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tietotekniikka | fi |
dc.contributor.oppiaine | Mathematical Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/BookItem | |
dc.date.updated | 2018-11-26T07:15:14Z | |
dc.relation.isbn | 978-3-319-75306-5 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 219-231 | |
dc.relation.issn | 2213-8986 | |
dc.relation.numberinseries | 93 | |
dc.type.version | acceptedVersion | |
dc.rights.copyright | © Springer International Publishing AG, part of Springer Nature 2018 | |
dc.rights.accesslevel | openAccess | fi |
dc.subject.yso | tietoturva | |
dc.subject.yso | SQL | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5479 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p2669 | |
dc.rights.url | http://rightsstatements.org/page/InC/1.0/?language=en | |
dc.relation.doi | 10.1007/978-3-319-75307-2_13 | |