REFERENCES
Acunetix (2019). Web Application Vulnerability Report.
https://cdn2.hubspot.net/hubfs/4595665/Acunetix
web application vulnerability report 2019.pdf.
Alrabaee, S., Shirani, P., Wang, L., and Debbabi, M. (2015).
Sigma: A semantic integrated graph matching ap-
proach for identifying reused functions in binary code.
Digital Investigation, 12:S61–S71.
Alrabaee, S., Shirani, P., Wang, L., and Debbabi, M. (2018).
Fossil: a resilient and efficient system for identifying
foss functions in malware binaries. ACM Transactions
on Privacy and Security (TOPS), 21(2):8.
Balasundaram, I. and Ramaraj, E. (2011). An authentica-
tion scheme for preventing sql injection attack using
hybrid encryption (psqlia-hbe). European Journal of
Scientific Research, 53(3):359–368.
Balasundaram, I. and Ramaraj, E. (2012). An efficient tech-
nique for detection and prevention of sql injection at-
tack using ascii based string matching. Procedia En-
gineering, 30:183–190.
Bisht, P., Madhusudan, P., and Venkatakrishnan, V. (2010).
Candid: Dynamic candidate evaluations for automatic
prevention of sql injection attacks. ACM Transac-
tions on Information and System Security (TISSEC),
13(2):14.
Boyd, S. W. and Keromytis, A. D. (2004). Sqlrand: Pre-
venting sql injection attacks. In International Confer-
ence on Applied Cryptography and Network Security,
pages 292–302. Springer.
Buehrer, G., Weide, B. W., and Sivilotti, P. A. (2005). Us-
ing parse tree validation to prevent sql injection at-
tacks. In Proceedings of the 5th international work-
shop on Software engineering and middleware, pages
106–113. ACM.
Darkreading (2019). SQL Injection Attacks Rep-
resent Two-Third of All Web App Attacks.
https://www.darkreading.com/attacks-breaches/sql-
injection-attacks-represent-two-third-of-all-web-app-
attacks/d/d-id/1334960.
DIVA (2016). Damn insecure and vulnerable App.
https://github.com/payatu/diva-android.
DVWA (2015). Damn Vulnerable Web App (DVWA).
http://www.dvwa.co.uk.
Junjin, M. (2009). An approach for sql injection vulnerabil-
ity detection. In 2009 Sixth International Conference
on Information Technology: New Generations, pages
1411–1414. IEEE.
Khoury, N., Zavarsky, P., Lindskog, D., and Ruhl, R.
(2011). Testing and assessing web vulnerability scan-
ners for persistent sql injection attacks. In proceedings
of the first international workshop on security and pri-
vacy preserving in e-societies, pages 12–18. ACM.
OWASP (2016). Web Application Vulnerability Report.
https://www.owasp.org/index.php.
Paige, M. (2013). The tangled web: A guide to securing
modern web applications by michal zalewski. ACM
SIGSOFT Software Engineering Notes, 38(4):39–40.
Patel, N. and Shekokar, N. (2015). Implementation of pat-
tern matching algorithm to defend sqlia. Procedia
Computer Science, 45:453–459.
Prabakar, M. A., Karthikeyan, M., and Marimuthu, K.
(2013). An efficient technique for preventing sql in-
jection attack using pattern matching algorithm. In
2013 IEEE International Conference ON Emerging
Trends in Computing, Communication and Nanotech-
nology (ICECCN), pages 503–506. IEEE.
Qbea’h, M., Alshraideh, M., and Sabri, K. E. (2016). De-
tecting and preventing sql injection attacks: a formal
approach. In 2016 Cybersecurity and Cyberforensics
Conference (CCC), pages 123–129. IEEE.
Sadeghian, A., Zamani, M., and Ibrahim, S. (2013). Sql in-
jection is still alive: a study on sql injection signature
evasion techniques. In 2013 International Conference
on Informatics and Creative Multimedia, pages 265–
268. IEEE.
Sathyanarayan, S., Qi, D., Liang, Z., and Roychoudary, A.
(2014). Sqlr: Grammar-guided validation of sql injec-
tion sanitizers. In 2014 19th International Conference
on Engineering of Complex Computer Systems, pages
154–157. IEEE.
SecurityIdiots (2012). SQL Injection Ninja Testing Labs.
http://leettime.net/sqlninja.com/index.php.
Veracode (2019). State of Software Security.
https://www.thehaguesecuritydelta.com/media/com
hsd/report/219/document/state-of-software-security-
2018-veracode-report.pdf.
Wassermann, G. and Su, Z. (2004). An analysis framework
for security in web applications. Citeseer.
WhiteHat (2019). Top 10 Applica-
tion Security Vulnerabilities of 2018.
https://www.whitehatsec.com/blog/whitehat-security-
top-10-application-security-vulnerabilities-of-2018.
Wu, H., Gao, G., et al. (2011). Test sql injection vulnera-
bilities in web applications based on structure match-
ing. In Proceedings of 2011 International Conference
on Computer Science and Network Technology, vol-
ume 2, pages 935–938. IEEE.
XSS (2019). XSS Game. https://xss-game.appspot.com/.
ZAkamai (2019). Web Attacks and Gaming Abuse.
https://www.akamai.com/us/en/multimedia/
documents/state-of-the-internet/soti-security-web-
attacks-and-gaming-abuse-report-2019.pdf/.
ICISSP 2020 - 6th International Conference on Information Systems Security and Privacy
610