@inproceedings{8b95a2a64112409e845f9320471f05a3,
title = "Type-specific languages to fight injection attacks",
abstract = "Injection vulnerabilities have topped rankings of the most critical web application vulnerabilities for several years [1, 2]. They can occur anywhere where user input may be erroneously executed as code. The injected input is typically aimed at gaining unauthorized access to the system or to private information within it, corrupting the system's data, or disturbing system availability. Injection vulnerabilities are tedious and difficult to prevent.",
author = "Darya Kurilova and Benjamin Chung and Cyrus Omar and Alex Potanin and Ligia Nistor and Jonathan Aldrich",
year = "2014",
month = apr,
day = "8",
doi = "10.1145/2600176.2600194",
language = "English",
isbn = "9781450329071",
series = "ACM International Conference Proceeding Series",
publisher = "Association for Computing Machinery (ACM)",
booktitle = "Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014",
address = "United States",
note = "2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014 ; Conference date: 08-04-2014 Through 09-04-2014",
}