Exploiting Software: How to Break Code
Exploiting Software: How to Break Code
Innocent Code: A Security Wake-Up Call for Web Programmers
Innocent Code: A Security Wake-Up Call for Web Programmers
Securing web application code by static analysis and runtime protection
Proceedings of the 13th international conference on World Wide Web
Case Study: Online Banking Security
IEEE Security and Privacy
Identity Theft: Much Too Easy? A Study of Online Systems in Norway
Financial Cryptography and Data Security
Information and Communications Technology Law
Hi-index | 0.00 |
This paper shows that more than 80% of the e-governments in the world are vulnerable to common web-application attacks such as Cross Site Scripting and Structured Query Language (SQL) injection. Industrialised countries were found to be more vulnerable than under-developed countries (90% versus 50%). This paper also describes some malicious data mining possibilities on the Norwegian e-government and how information can be combined and used to create other practical attacks.