2016
DOI: 10.1007/978-3-319-46598-2_13
|View full text |Cite
|
Sign up to set email alerts
|

Formal Analysis of Vulnerabilities of Web Applications Based on SQL Injection

Abstract: We present a formal approach for the analysis of attacks that exploit SQLi to violate security properties of web applications. We give a formal representation of web applications and databases, and show that our formalization effectively exploits SQLi attacks. We implemented our approach in a prototype tool called SQLfast and we show its efficiency on four real-world case studies, including the discovery of an attack on Joomla! that no other tool can find.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(19 citation statements)
references
References 13 publications
(72 reference statements)
0
19
0
Order By: Relevance
“…This allows for functionalities such as blog posting, forum discussions, etc. Querying a database is performed using the Structured Query Language SQL and whenever a query is created using user-supplied data, SQLi attacks could be possible [10,17,26]. Most modern DMBSs provide APIs that extend SQL's expressiveness by allowing SQL code to access a web app's file-system for reading and writing purposes.…”
Section: A Classification Of File-system-related Vulnerabilitiesmentioning
confidence: 99%
See 4 more Smart Citations
“…This allows for functionalities such as blog posting, forum discussions, etc. Querying a database is performed using the Structured Query Language SQL and whenever a query is created using user-supplied data, SQLi attacks could be possible [10,17,26]. Most modern DMBSs provide APIs that extend SQL's expressiveness by allowing SQL code to access a web app's file-system for reading and writing purposes.…”
Section: A Classification Of File-system-related Vulnerabilitiesmentioning
confidence: 99%
“…The idea behind the extension is to make the database able to perform a reading or writing request to the file-system whenever a query is valid. We also modified how sanitized queries are handled by removing the sanitization function sanitizedQuery() from the database specification of [10] and introducing a new uninterpreted function sanitized() that represents a general sanitization function (see § 3.4 for further details). For brevity, we give in § A a description of the database behavior as given in [10] while in this section we focus on the extension.…”
Section: Databasementioning
confidence: 99%
See 3 more Smart Citations