Intercepting Filter Approach to Injection Flaws


Ahmed Salem, Journal of Information Processing Systems
Vol. 6, No. 4, pp. 563-574, Aug. 2010
10.3745/JIPS.2010.6.4.563
Keywords: Injection Flaws, SQL Injection, Intercepting Filter, Cross-site Scripting Vulnerability
Fulltext:

Abstract

The growing number of web applications in the global economy has made it critically important to develop secure and reliable software to support the economy's increasing dependence on web-based systems. We propose an intercepting filter approach to mitigate the risk of injection flaw exploitation- one of the most dangerous methods of attacking web applications. The proposed approach can be implemented in Java or .NET environments following the intercepting filter design pattern. This paper provides examples to illustrate the proposed approach.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.




Cite this article
[APA Style]
Ahmed Salem (2010). Intercepting Filter Approach to Injection Flaws . Journal of Information Processing Systems, 6(4), 563-574. DOI: 10.3745/JIPS.2010.6.4.563 .

[IEEE Style]
A. Salem, "Intercepting Filter Approach to Injection Flaws ," Journal of Information Processing Systems, vol. 6, no. 4, pp. 563-574, 2010. DOI: 10.3745/JIPS.2010.6.4.563 .

[ACM Style]
Ahmed Salem. 2010. Intercepting Filter Approach to Injection Flaws . Journal of Information Processing Systems, 6, 4, (2010), 563-574. DOI: 10.3745/JIPS.2010.6.4.563 .