2015 IEEE 39th Annual Computer Software and Applications Conference 2015
DOI: 10.1109/compsac.2015.277
|View full text |Cite
|
Sign up to set email alerts
|

Detecting SQL Vulnerability Attack Based on the Dynamic and Static Analysis Technology

Abstract: Targeting at PHP program, this paper proposes an SQL vulnerability detection method based on the injection analysis technology. This method makes a detailed analysis on the one-time injection in the aspects of data flow and program behavior, on the basis of the combination of dynamic and static analysis technique. Then it implements the SQL vulnerability determination algorithm which is based on lexical feature comparison. At last, this paper combines alias analysis technology, behavior model and SQL which is … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 2 publications
(2 reference statements)
0
3
0
Order By: Relevance
“…Static detection. Static detection methodologies, such as white-box testing, involve the evaluation of potential SQL injection vulnerabilities via static source code analysis [7] without necessitating program execution. Gould et al developed a code analysis tool, the JDBC Checker [8].…”
Section: Related Studiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Static detection. Static detection methodologies, such as white-box testing, involve the evaluation of potential SQL injection vulnerabilities via static source code analysis [7] without necessitating program execution. Gould et al developed a code analysis tool, the JDBC Checker [8].…”
Section: Related Studiesmentioning
confidence: 99%
“…In the domain of SQL injection attack detection, the prevalence of imbalanced positive and negative samples renders the use of accuracy as an evaluation metric unreasonable. Therefore, in addition to the detection accuracy (Accuracy), recall (Recall), and precision (Precision), the evaluation indicators used for the detection of SQL injection attack statements also use F1-Score as a comprehensive evaluation standard; its calculation formula is shown in ( 4)- (7). Meanwhile, this paper presents a comparative analysis of the model proposed herein with other existing models.…”
Section: Testing Indexmentioning
confidence: 99%
“…Yaohui Wang et.al [16] proposes SQL vulnerability detection which is dependent on injection analysis. This method gives a detailed analysis of a one-time injection in the parts of data flow and program behavior, based on the combination of static and dynamic examination methods.…”
Section: Literature Surveymentioning
confidence: 99%
“…Traditional SQL injection detection methods can be divided into static analysis, dynamic analysis and parameter filtering [9]. Static analysis method detects the type error and grammatical error by analyzing the input statements [10]. Santhosh Kumar et al detected SQL injection through the program interface instead of considering the internal characteristics [11].…”
Section: Related Workmentioning
confidence: 99%