Visible to the public Biblio

Filters: Keyword is SQL-Injection  [Clear All Filters]
2017-05-22
Ceccato, Mariano, Nguyen, Cu D., Appelt, Dennis, Briand, Lionel C..  2016.  SOFIA: An Automated Security Oracle for Black-box Testing of SQL-injection Vulnerabilities. Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering. :167–177.

Security testing is a pivotal activity in engineering secure software. It consists of two phases: generating attack inputs to test the system, and assessing whether test executions expose any vulnerabilities. The latter phase is known as the security oracle problem. In this work, we present SOFIA, a Security Oracle for SQL-Injection Vulnerabilities. SOFIA is programming-language and source-code independent, and can be used with various attack generation tools. Moreover, because it does not rely on known attacks for learning, SOFIA is meant to also detect types of SQLi attacks that might be unknown at learning time. The oracle challenge is recast as a one-class classification problem where we learn to characterise legitimate SQL statements to accurately distinguish them from SQLi attack statements. We have carried out an experimental validation on six applications, among which two are large and widely-used. SOFIA was used to detect real SQLi vulnerabilities with inputs generated by three attack generation tools. The obtained results show that SOFIA is computationally fast and achieves a recall rate of 100% (i.e., missing no attacks) with a low false positive rate (0.6%).

2017-03-29
Mavromoustakos, Stephanos, Patel, Aakash, Chaudhary, Kinjal, Chokshi, Parth, Patel, Shaili.  2016.  Causes and Prevention of SQL Injection Attacks in Web Applications. Proceedings of the 4th International Conference on Information and Network Security. :55–59.

SQL injection is one of the major threats to the security of the web applications. Attackers try to gain unauthorized access to the database, which has vital and private information of the users. Many researchers have provided various techniques and practices to protect the web applications from attackers. There is a plethora of techniques available to perform SQL injection and usually not everyone is familiar with every attack. Hence, this kind of attack is still the most prevalent. In this paper, we have presented the types of SQL injections attacks and most dominant ways to prevent them.