2011
DOI: 10.1007/978-3-642-22786-8_13
|View full text |Cite
|
Sign up to set email alerts
|

Detection and Prevention of SQL Injection Attacks Using Semantic Equivalence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
3
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…Query rewriting involves transforming an original query into a more efficient version without altering its semantic meaning. The primary purpose of query rewriting is to optimize query execution by restructuring the query to take advantage of database indexing and other optimization strategies (Narayanan et al, 2011). This transformation process leverages rules and heuristics to modify the query, aiming to reduce the computational overhead and improve performance.…”
Section: Query Rewriting Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…Query rewriting involves transforming an original query into a more efficient version without altering its semantic meaning. The primary purpose of query rewriting is to optimize query execution by restructuring the query to take advantage of database indexing and other optimization strategies (Narayanan et al, 2011). This transformation process leverages rules and heuristics to modify the query, aiming to reduce the computational overhead and improve performance.…”
Section: Query Rewriting Techniquesmentioning
confidence: 99%
“…Another method is join reordering, which rearranges the order of join operations to exploit indexes and reduce the number of tuples processed. Additionally, subquery unnesting transforms subqueries into equivalent join operations, improving execution efficiency by leveraging the database's join optimization capabilities (Narayanan et al, 2011). These techniques, among others, are widely used to enhance query performance by optimizing the structure and execution plan of SQL queries.…”
Section: Query Rewriting Techniquesmentioning
confidence: 99%
“…Changes in a query's structure when compared with known, valid input indicate a malicious query [23,24]. Some works also focus on common substructures of parse trees [25] or leverage semantic equivalence between queries [26].…”
Section: Related Workmentioning
confidence: 99%
“…Parsing Approach is also known as parse tree approach. This is a technique to detect and avoid a SQLIA on the application's URL, was suggested by [23]. In this technique, the SQL_statement_safe query model was developed as a library with a SQL statement syntax grammar.…”
Section: Parsing Approachmentioning
confidence: 99%