2013 Second International Conference on Informatics &Amp; Applications (ICIA) 2013
DOI: 10.1109/icoia.2013.6650259
|View full text |Cite
|
Sign up to set email alerts
|

A black-box testing tool for detecting SQL injection vulnerabilities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
22
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 36 publications
(22 citation statements)
references
References 14 publications
0
22
0
Order By: Relevance
“…The malicious statement is, for example, sent via user input fields in web forms. If the application fails to validate the input properly, the malicious statements are injected into legitimate queries and forwarded to the DBMS [2]- [5].…”
Section: Introductionmentioning
confidence: 99%
“…The malicious statement is, for example, sent via user input fields in web forms. If the application fails to validate the input properly, the malicious statements are injected into legitimate queries and forwarded to the DBMS [2]- [5].…”
Section: Introductionmentioning
confidence: 99%
“…academic, open source Scanner and commercial [7], [8]. Individuals having same interest of research take assistance from academic scanner to introduce their own scanner like SQIVS [9], Increase the MySQLinj factor [10], secubat [11] State aware scanner [12], Amnisia [13] and wave [14], etc. Many academic scanners are not in the reach of a public, language dependent and are under development.…”
Section: Background and Litrature Reviewmentioning
confidence: 99%
“…9. The basic idea for implementation of crawling component was taken from existing systems [9], [11], [14], [27], [28]. 2) Attack Module: Once crawling phase was completed; next phase is to initialize processing on the list of target web pages.…”
Section: ) Crawling Modulementioning
confidence: 99%
See 2 more Smart Citations