1. A survey on server-side approaches to securing web applications;Li X.;ACM Comput. Survey CSUR,2014
2. Ghorbamzadeh M. Shahriari H.R.: ‘Static detection of second order injection vulnerabilities using query dependency graph’.(In Persian) Presented at the 17th CSI Computer Conf. Tehran 2012 pp.579–584
3. Felmetsger V. Cavedon L. Kruegel C. et al.: ‘Toward automated detection of logic vulnerabilities in web applications’.USENIX Security Symp. Washington DC 2010 pp.143–160
4. Sun F. Xu L. Su Z.: ‘Detecting logic vulnerabilities in E-commerce applications’.Presented at the Network and Distributed System Security (NDSS) Symp. San Diego California 2014
5. Chen Y. Xing L. Qin Y. et al.: ‘Devils in the guidance: predicting logic vulnerabilities in payment syndication services through automated documentation analysis’.28th USENIX Security Symp. (USENIX Security 19) Santa Clara CA USA 2019 pp.747–764