About cookies on this site Our websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising. For more information, please review your options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.
Detecting Security Vulnerabilities in Cloud Applications
Publications
- Aviv Ron, Alexandra Shulman-Peleg , Anton Puzanov: Analysis and Mitigation of NoSQL Injection, IEEE Journal on Security and Privacy, March/April 2016, Vol 14(2).
- No SQL, No Injection? Examining NoSQL Security,
by A. Ron, A. Shulman-Peleg, and E. Bronshtein, Proceedings of the 9th Workshop on Web 2.0 Security and Privacy (W2SP) 2015.