Visible to the public SQL-Identifier Injection Attacks

TitleSQL-Identifier Injection Attacks
Publication TypeConference Paper
Year of Publication2019
AuthorsCetin, Cagri, Goldgof, Dmitry, Ligatti, Jay
Conference Name2019 IEEE Conference on Communications and Network Security (CNS)
Keywordsautomated analysis, code vulnerability, Collaboration, confidential patient information, electronic health records, electronic medical record software, GitHub, Health Care, Human Behavior, injecting identifiers, Java, Metrics, policy-based governance, prepared-statement API, privacy, pubcrawl, resilience, Resiliency, security of data, software maintenance, software reliability, SQL, SQL detection, SQL Injection, SQL statements, SQL-ID IAs, SQL-identifier injection attacks
AbstractThis paper defines a class of SQL-injection attacks that are based on injecting identifiers, such as table and column names, into SQL statements. An automated analysis of GitHub shows that 15.7% of 120,412 posted Java source files contain code vulnerable to SQL-Identifier Injection Attacks (SQL-IDIAs). We have manually verified that some of the 18,939 Java files identified during the automated analysis are indeed vulnerable to SQL-ID IAs, including deployed Electronic Medical Record software for which SQL-IDIAs enable discovery of confidential patient information. Although prepared statements are the standard defense against SQL injection attacks, existing prepared-statement APIs do not protect against SQL-IDIAs. This paper therefore proposes and evaluates an extended prepared-statement API to protect against SQL-IDIAs.
DOI10.1109/CNS.2019.8802743
Citation Keycetin_sql-identifier_2019