Sign in

A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks.

Yves YounanWouter JoosenFrank Piessens
Published in: IWIA (2005)
Keyphrases
  • countermeasures
  • sql injection
  • injection attacks
  • information security
  • power analysis
  • security measures
  • source code
  • database
  • java card