2010 10th IEEE/IPSJ International Symposium on Applications and the Internet 2010
DOI: 10.1109/saint.2010.60
|View full text |Cite
|
Sign up to set email alerts
|

Analysis & Detection of SQL Injection Vulnerabilities via Automatic Test Case Generation of Programs

Abstract: SQL injection attacks occur due to vulnerabilities in the design of queries where a malicious user can take advantage of input opportunities to insert code in the queries that modify the query-conditions resulting in unauthorized database access. We provide a novel technique to identify the possibilities of such attacks. The central theme of our technique is based on automatically developing a model for a SQL query such that the model captures the dependencies between various components (sub-queries) of the qu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
14
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(14 citation statements)
references
References 9 publications
0
14
0
Order By: Relevance
“…If a defect is detected, an attack is replayed by the tool to developers. Ruse, Sarkar & Basu (2010) detect SQL injection vulnerabilities in a similar manner. In addition, Rubyx (Chaudhuri & Foster, 2010) follows a similar approach to counter JavaScript injection attacks in applications written in Ruby.…”
Section: Symbolic Executionmentioning
confidence: 98%
“…If a defect is detected, an attack is replayed by the tool to developers. Ruse, Sarkar & Basu (2010) detect SQL injection vulnerabilities in a similar manner. In addition, Rubyx (Chaudhuri & Foster, 2010) follows a similar approach to counter JavaScript injection attacks in applications written in Ruby.…”
Section: Symbolic Executionmentioning
confidence: 98%
“…Case Generation of Programs" [12] Ruse et al [12] have proposed an approach that uses automatic test case generation to detect SQL injection vulnerabilities. The main idea behind this framework is based on creating a specific model that deals with SQL queries automatically.…”
Section: "Analysis and Detection Of Sql Injection Vulnerabilities Via Amentioning
confidence: 99%
“…10 Ruse et al [12] Idea behind this framework is based on creating a specific model that deals with SQL queries automatically.…”
mentioning
confidence: 99%
“…[23], CREST has been used by several research groups. For instance, CREST has been used to build tools for regression testing [139], for detecting SQL injection vulnerabilities [118], and for identifying infeasible code to achieve high structural coverage [12], and has been modified to run distributed on a cluster for testing a flash storage platform [81]. In the development of this research project, we also used CREST for structural coverage testing and security testing.…”
Section: Dynamic Symbolic Executionmentioning
confidence: 99%