Show simple item record

dc.contributor.authorTirronen, Ville
dc.contributor.editorLehto, Martti
dc.contributor.editorNeittaanmäki, Pekka
dc.date.accessioned2018-12-05T12:59:15Z
dc.date.available2019-05-05T21:35:18Z
dc.date.issued2018
dc.identifier.citationTirronen, V. (2018). Stopping injection attacks with code and structured data. In M. Lehto, & P. Neittaanmäki (Eds.), <i>Cyber Security : Power and Technology</i> (pp. 219-231). Springer. Intelligent Systems, Control and Automation : Science and Engineering, 93. <a href="https://doi.org/10.1007/978-3-319-75307-2_13" target="_blank">https://doi.org/10.1007/978-3-319-75307-2_13</a>
dc.identifier.otherCONVID_28046354
dc.identifier.otherTUTKAID_77604
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/60508
dc.description.abstractInjection attacks top the lists of the most harmful software vulnerabilities. Injection vulnerabilities are both commonplace and easy to exploit, which makes development of injection protection schemes important. In this article, we show how injection attacks can be practically eliminated through the use of structured data paired with cryptographic verification codes upon transmission.fi
dc.format.extent288
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherSpringer
dc.relation.ispartofCyber Security : Power and Technology
dc.relation.ispartofseriesIntelligent Systems, Control and Automation : Science and Engineering
dc.rightsIn Copyright
dc.subject.otherXSS
dc.subject.otherinjection
dc.subject.otherSQL injection
dc.subject.otherproof-carrying code
dc.subject.othercryptographic hash
dc.titleStopping injection attacks with code and structured data
dc.typebookPart
dc.identifier.urnURN:NBN:fi:jyu-201811264868
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTietotekniikkafi
dc.contributor.oppiaineMathematical Information Technologyen
dc.type.urihttp://purl.org/eprint/type/BookItem
dc.date.updated2018-11-26T07:15:14Z
dc.relation.isbn978-3-319-75306-5
dc.type.coarhttp://purl.org/coar/resource_type/c_3248
dc.description.reviewstatuspeerReviewed
dc.format.pagerange219-231
dc.relation.issn2213-8986
dc.relation.numberinseries93
dc.type.versionacceptedVersion
dc.rights.copyright© Springer International Publishing AG, part of Springer Nature 2018
dc.rights.accesslevelopenAccessfi
dc.subject.ysotietoturva
dc.subject.ysoSQL
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p5479
jyx.subject.urihttp://www.yso.fi/onto/yso/p2669
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.relation.doi10.1007/978-3-319-75307-2_13
dc.type.okmA3


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

In Copyright
Except where otherwise noted, this item's license is described as In Copyright