Sciweavers

6 search results - page 2 / 2
» Negations and document length in logical retrieval
Sort
View
237
Voted
POPL
2006
ACM
16 years 21 days ago
The essence of command injection attacks in web applications
Web applications typically interact with a back-end database to retrieve persistent data and then present the data to the user as dynamically generated output, such as HTML web pa...
Zhendong Su, Gary Wassermann