透過您的圖書館登入
IP:3.138.122.4

並列摘要


This paper describes a class of SQL injection attacks (SQLIA) where attackers can deduce information from the back-end database management system (DBMS) without transferring actual data. Instead, by using predetermined differentiation mechanism, information is being inferred piece by piece. Because of its widespread success, particularly in difficult situations where other SQLIA classes fail, understanding of this subject is of great importance for successful mitigation of this type of attacks.

被引用紀錄


林真合(2014)。《大般涅槃經》的中道佛性理論〔博士論文,國立臺灣大學〕。華藝線上圖書館。https://doi.org/10.6342/NTU.2014.03109
郭依蓁(2007)。由彎曲型分子形成盤狀液晶之探討〔碩士論文,國立中央大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0031-0207200917351162
張俊翔(2007)。雙氟取代基對TGBA*相生成的影響〔碩士論文,大同大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0081-0607200917241288
江日新(2015)。老子哲學有多哲學?從漢學到哲學的閱讀與解釋〔博士論文,國立中央大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0031-0412201512035740

延伸閱讀