Semi-automated verification of defense against SQL injection in web applications
Recent reports reveal that majority of the attacks to Web applications are input manipulation attacks. Among these attacks, SQL injection attack malicious input is submitted to manipulate the database in a way that was unintended by the applications' developers is one such attack. This paper pr...
Saved in:
Main Authors: | , , |
---|---|
Other Authors: | |
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2013
|
Online Access: | https://hdl.handle.net/10356/96596 http://hdl.handle.net/10220/12895 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-96596 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-965962020-03-07T13:24:47Z Semi-automated verification of defense against SQL injection in web applications Liu, Kaiping Tan, Hee Beng Kuan Shar, Lwin Khin School of Electrical and Electronic Engineering Asia-Pacific Software Engineering Conference (19th : 2012 : Hong Kong, China) Recent reports reveal that majority of the attacks to Web applications are input manipulation attacks. Among these attacks, SQL injection attack malicious input is submitted to manipulate the database in a way that was unintended by the applications' developers is one such attack. This paper proposes an approach for assisting to code verification process on the defense against SQL injection. The approach extracts all such defenses implemented in code. With the use of the proposed approach, developers, testers or auditors can then check the defenses extracted from code to verify their adequacy. We have evaluated the feasibility, effectiveness, and usefulness of the proposed approach by a set of open-source systems. Our experiment results showed that the proposed approach is effective in extracting all the possible defenses implemented/adopted by Web applications. We observed that the proposed approach would be useful in identifying the false positive cases resulting from other related approaches and auditing the code in order to fix the actual vulnerable cases. 2013-08-02T04:49:44Z 2019-12-06T19:32:53Z 2013-08-02T04:49:44Z 2019-12-06T19:32:53Z 2012 2012 Conference Paper https://hdl.handle.net/10356/96596 http://hdl.handle.net/10220/12895 10.1109/APSEC.2012.18 en |
institution |
Nanyang Technological University |
building |
NTU Library |
country |
Singapore |
collection |
DR-NTU |
language |
English |
description |
Recent reports reveal that majority of the attacks to Web applications are input manipulation attacks. Among these attacks, SQL injection attack malicious input is submitted to manipulate the database in a way that was unintended by the applications' developers is one such attack. This paper proposes an approach for assisting to code verification process on the defense against SQL injection. The approach extracts all such defenses implemented in code. With the use of the proposed approach, developers, testers or auditors can then check the defenses extracted from code to verify their adequacy. We have evaluated the feasibility, effectiveness, and usefulness of the proposed approach by a set of open-source systems. Our experiment results showed that the proposed approach is effective in extracting all the possible defenses implemented/adopted by Web applications. We observed that the proposed approach would be useful in identifying the false positive cases resulting from other related approaches and auditing the code in order to fix the actual vulnerable cases. |
author2 |
School of Electrical and Electronic Engineering |
author_facet |
School of Electrical and Electronic Engineering Liu, Kaiping Tan, Hee Beng Kuan Shar, Lwin Khin |
format |
Conference or Workshop Item |
author |
Liu, Kaiping Tan, Hee Beng Kuan Shar, Lwin Khin |
spellingShingle |
Liu, Kaiping Tan, Hee Beng Kuan Shar, Lwin Khin Semi-automated verification of defense against SQL injection in web applications |
author_sort |
Liu, Kaiping |
title |
Semi-automated verification of defense against SQL injection in web applications |
title_short |
Semi-automated verification of defense against SQL injection in web applications |
title_full |
Semi-automated verification of defense against SQL injection in web applications |
title_fullStr |
Semi-automated verification of defense against SQL injection in web applications |
title_full_unstemmed |
Semi-automated verification of defense against SQL injection in web applications |
title_sort |
semi-automated verification of defense against sql injection in web applications |
publishDate |
2013 |
url |
https://hdl.handle.net/10356/96596 http://hdl.handle.net/10220/12895 |
_version_ |
1681038601193783296 |