TPSQLi: Test Prioritization for SQL Injection Vulnerability Detection in Web Applications

被引:0
|
作者
Yang, Guan-Yan [1 ]
Wang, Farn [1 ]
Gu, You-Zong [1 ,2 ]
Teng, Ya-Wen [1 ]
Yeh, Kuo-Hui [3 ,4 ]
Ho, Ping-Hsueh [1 ]
Wen, Wei-Ling [1 ]
机构
[1] Natl Taiwan Univ, Dept Elect Engn, Taipei 106319, Taiwan
[2] CyberLink Corp, New Taipei 231023, Taiwan
[3] Natl Yang Ming Chiao Tung Univ, Inst Artificial Intelligence Innovat, Hsinchu 300093, Taiwan
[4] Natl Dong Hwa Univ, Dept Informat Management, Hualien 974301, Taiwan
来源
APPLIED SCIENCES-BASEL | 2024年 / 14卷 / 18期
关键词
software testing; penetration testing; automatic testing; information security; SQL injection; testing priority;
D O I
10.3390/app14188365
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The rapid proliferation of network applications has led to a significant increase in network attacks. According to the OWASP Top 10 Projects report released in 2021, injection attacks rank among the top three vulnerabilities in software projects. This growing threat landscape has increased the complexity and workload of software testing, necessitating advanced tools to support agile development cycles. This paper introduces a novel test prioritization method for SQL injection vulnerabilities to enhance testing efficiency. By leveraging previous test outcomes, our method adjusts defense strength vectors for subsequent tests, optimizing the testing workflow and tailoring defense mechanisms to specific software needs. This approach aims to improve the effectiveness and efficiency of vulnerability detection and mitigation through a flexible framework that incorporates dynamic adjustments and considers the temporal aspects of vulnerability exposure.
引用
收藏
页数:21
相关论文
共 50 条
  • [31] Design and Implementation of an Automatic Scanning Tool of SQL Injection Vulnerability Based on Web Crawler
    Lei, Xiaochun
    Qu, Jiashi
    Yao, Gang
    Chen, Junyan
    Shen, Xin
    SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 481 - 488
  • [32] XSS Vulnerability Test Enhancement for Progressive Web Applications
    Valles, Josep Pegueroles
    Bongard, Sebastien Kanj
    Castellvi, Arnau Estebanell
    DIGITAL FORENSICS AND CYBER CRIME, PT 2, ICDF2C 2023, 2024, 571 : 152 - 163
  • [33] Towards Trustworthy Neural Network Intrusion Detection for Web SQL Injection
    Zhou, Qianru
    2024 IEEE INTERNATIONAL CONFERENCE AND EXPO ON REAL TIME COMMUNICATIONS AT IIT, RTC 2024, 2024, : 9 - 15
  • [34] Exposing SQL Injection Vulnerability through Penetration Test Based on Finite State Machine
    Liu, Lei
    Xu, Jing
    Guo, Chenkai
    Kang, Jiehui
    Xu, Sihan
    Zhang, Biao
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 1171 - 1175
  • [35] An Effective Penetration Test Approach based on Feature Matrix for Exposing SQL Injection Vulnerability
    Liu, Lei
    Xu, Jing
    Yang, Hongji
    Guo, Chenkai
    Kang, Jiehui
    Xu, Sihan
    Zhang, Biao
    Si, Guannan
    PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS, VOL 1, 2016, : 123 - 132
  • [36] Research on SQL Injection Vulnerability Attack model
    Su, Guanyu
    Wang, Fang
    Li, Qi
    PROCEEDINGS OF 2018 5TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (CCIS), 2018, : 217 - 221
  • [37] A Collaborative Filtering Recommender System for Test Case Prioritization in Web Applications
    Azizi, Maral
    Do, Hyunsook
    33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2018, : 1560 - 1567
  • [38] New test case prioritization strategies for regression testing of web applications
    Garg, Deepak
    Datta, Amitava
    French, Tim
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2012, 3 (04) : 300 - 309
  • [39] sqlFuzz: Directed Fuzzing for SQL Injection Vulnerability
    Yuan, Ye
    Lu, Yuliang
    Zhu, Kailong
    Huang, Hui
    Chen, Yuanchao
    Zhang, Yifan
    ELECTRONICS, 2024, 13 (15)
  • [40] New test case prioritization strategies for regression testing of web applications
    Deepak Garg
    Amitava Datta
    Tim French
    International Journal of System Assurance Engineering and Management, 2012, 3 (4) : 300 - 309