A Static Detection Method for SQL Injection Vulnerability Based on Program Transformation

被引:2
|
作者
Yuan, Ye [1 ,2 ]
Lu, Yuliang [1 ,2 ]
Zhu, Kailong [1 ,2 ]
Huang, Hui [1 ,2 ]
Yu, Lu [1 ,2 ]
Zhao, Jiazhen [1 ,2 ]
机构
[1] Natl Univ Def Technol, Coll Elect Engn, Hefei 230037, Peoples R China
[2] Anhui Prov Key Lab Cyberspace Secur Situat Awarene, Hefei 230037, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 21期
关键词
static analysis; object-oriented; database extensions; program transformation-based; detection of SQL injection vulnerabilities; WEB APPLICATION VULNERABILITIES;
D O I
10.3390/app132111763
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Static analysis is popular for detecting SQL injection vulnerabilities. However, due to the lack of accurate modeling of object-oriented database extensions, current methods fail to accurately detect SQL injection vulnerabilities in applications that use object-oriented database extensions. We propose a program transformation-based SQL injection vulnerability detection method to address this issue. This method consists of two stages: program transformation and vulnerability detection. In the first stage, object-oriented database extensions are automatically transformed into semantically equivalent procedural database extensions through the identification of key statements, call relation verification, and program transformation. In the second stage, application programs are automatically scanned using a combination of control flow graph construction and taint analysis techniques to detect SQL injection vulnerabilities. Based on the proposed method, we have implemented the OODBE-SCAN prototype system and performed experimental analysis on eight modern PHP applications. We compare OODBE-SCAN with two related static analysis tools, RIPS and Seay. The results show that OODBE-SCAN can detect more real-world vulnerabilities and has higher accuracy than existing methods.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] Detection of SQL Injection Vulnerability in Embedded SQL
    Jang, Young-Su
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2020, E103D (05): : 1173 - 1176
  • [2] A Component Based SQL Injection Vulnerability Detection Tool
    Aliero, Muhammmad Saidu
    Ghani, Imran
    2015 9TH MALAYSIAN SOFTWARE ENGINEERING CONFERENCE (MYSEC2015), 2015, : 224 - 229
  • [3] An approach for SQL injection vulnerability detection
    Mei Junjin
    PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 1411 - 1414
  • [4] Automatic vulnerability detection algorithm for the SQL-injection
    Rakhmanov A.T.
    Khamdamov R.K.
    Kerimov K.F.
    Kamalov S.K.
    Journal of Automation and Information Sciences, 2019, 51 (07): : 47 - 54
  • [5] A Vulnerability Static Detection Method Based on Flow Analysis
    Zhang, Yiqiang
    Gui, Hui
    2010 INTERNATIONAL CONFERENCE ON INFORMATION, ELECTRONIC AND COMPUTER SCIENCE, VOLS 1-3, 2010, : 592 - 595
  • [6] A SQL Injection Detection Method Based on Adaptive Deep Forest
    Li, Qi
    Li, Weishi
    Wang, Junfeng
    Cheng, Mingyu
    IEEE ACCESS, 2019, 7 (145385-145394) : 145385 - 145394
  • [7] Formulation of SQL Injection Vulnerability Detection as Grammar Reachability Problem
    Umar, Kabir
    Sultan, Abu Bakar
    Zulzalil, Hazura
    Admodisastro, Novia
    Abdullah, Mohd Taufik
    PROCEEDINGS 2018 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR THE MUSLIM WORLD (ICT4M), 2018, : 179 - 184
  • [8] A novel method for SQL injection attack detection based on removing SQL query attribute values
    Lee, Inyong
    Jeong, Soonki
    Yeo, Sangsoo
    Moon, Jongsub
    MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (1-2) : 58 - 68
  • [9] Code vulnerability static detection method based on graphrepresentation and MHGAT
    Cheng J.
    Wang B.
    Luo P.
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2023, 45 (05): : 1535 - 1543
  • [10] Deep Neural Network-Based SQL Injection Detection Method
    Zhang, Wei
    Li, Yueqin
    Li, Xiaofeng
    Shao, Minggang
    Mi, Yajie
    Zhang, Hongli
    Zhi, Guoqing
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022