Securing Large Applications Against Command Injections | IEEE Conference Publication | IEEE Xplore