Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks: Difference between revisions

Line 15: Line 15:
The rest of this paper is organized as follows.  Section 2 presents the required background for understanding our study procedure.  After that, Section 3 describes the case study, including the subject applications and experimental setup.  Next, Section 4 presents the results of our case study.  Section 5 presents limitations of the study. Finally, Section 6 describes the conclusions we reached from our study.
The rest of this paper is organized as follows.  Section 2 presents the required background for understanding our study procedure.  After that, Section 3 describes the case study, including the subject applications and experimental setup.  Next, Section 4 presents the results of our case study.  Section 5 presents limitations of the study. Finally, Section 6 describes the conclusions we reached from our study.


== 12. References ==
== 7. References ==


: <sup>[1]</sup> Halfond, W.G.J., Orso, A.: AMNESIA: analysis and monitoring for neutralizing SQL-injection attacks. 20th IEEE/ACM International Conference on Automated Software Engineering, Long Beach, CA, USA (2005) 174-183
: <sup>[1]</sup> Halfond, W.G.J., Orso, A.: AMNESIA: analysis and monitoring for neutralizing SQL-injection attacks. 20th IEEE/ACM International Conference on Automated Software Engineering, Long Beach, CA, USA (2005) 174-183