Login / Signup

Automated testing for SQL injection vulnerabilities: an input mutation approach.

Dennis AppeltCu Duy NguyenLionel C. BriandNadia Alshahwan
Published in: ISSTA (2014)
Keyphrases
  • security vulnerabilities
  • sql injection
  • genetic algorithm
  • evolutionary algorithm
  • differential evolution
  • computer systems
  • countermeasures
  • web applications
  • information security
  • sql injection attacks