A Static Detection Method for SQL Injection Vulnerability Based on Program Transformation

被引:2
|
作者
Yuan, Ye [1 ,2 ]
Lu, Yuliang [1 ,2 ]
Zhu, Kailong [1 ,2 ]
Huang, Hui [1 ,2 ]
Yu, Lu [1 ,2 ]
Zhao, Jiazhen [1 ,2 ]
机构
[1] Natl Univ Def Technol, Coll Elect Engn, Hefei 230037, Peoples R China
[2] Anhui Prov Key Lab Cyberspace Secur Situat Awarene, Hefei 230037, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 21期
关键词
static analysis; object-oriented; database extensions; program transformation-based; detection of SQL injection vulnerabilities; WEB APPLICATION VULNERABILITIES;
D O I
10.3390/app132111763
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Static analysis is popular for detecting SQL injection vulnerabilities. However, due to the lack of accurate modeling of object-oriented database extensions, current methods fail to accurately detect SQL injection vulnerabilities in applications that use object-oriented database extensions. We propose a program transformation-based SQL injection vulnerability detection method to address this issue. This method consists of two stages: program transformation and vulnerability detection. In the first stage, object-oriented database extensions are automatically transformed into semantically equivalent procedural database extensions through the identification of key statements, call relation verification, and program transformation. In the second stage, application programs are automatically scanned using a combination of control flow graph construction and taint analysis techniques to detect SQL injection vulnerabilities. Based on the proposed method, we have implemented the OODBE-SCAN prototype system and performed experimental analysis on eight modern PHP applications. We compare OODBE-SCAN with two related static analysis tools, RIPS and Seay. The results show that OODBE-SCAN can detect more real-world vulnerabilities and has higher accuracy than existing methods.
引用
收藏
页数:18
相关论文
共 50 条
  • [11] TPSQLi: Test Prioritization for SQL Injection Vulnerability Detection in Web Applications
    Yang, Guan-Yan
    Wang, Farn
    Gu, You-Zong
    Teng, Ya-Wen
    Yeh, Kuo-Hui
    Ho, Ping-Hsueh
    Wen, Wei-Ling
    APPLIED SCIENCES-BASEL, 2024, 14 (18):
  • [12] MUSIC: Mutation-based SQL Injection Vulnerability Checking
    Shahriar, Hossain
    Zulkernine, Mohammad
    QSIC 2008: PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE, 2008, : 77 - 86
  • [13] Detecting SQL Vulnerability Attack based on the Dynamic and Static Analysis Technology
    Wang, Yaohui
    Wang, Dan
    Zhao, Wenbing
    Liu, Yuan
    IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 604 - 607
  • [14] SQL Injection Behavior Detection Method Based on AOP and Dynamic Taint Analysis
    He C.-W.
    Ye Z.-P.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2019, 47 (11): : 2413 - 2419
  • [15] LSTM-Based SQL Injection Detection Method for Intelligent Transportation System
    Li, Qi
    Wang, Fang
    Wang, Junfeng
    Li, Weishi
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (05) : 4182 - 4191
  • [16] DIAVA: A Traffic-Based Framework for Detection of SQL Injection Attacks and Vulnerability Analysis of Leaked Data
    Gu, Haifeng
    Zhang, Jianning
    Liu, Tian
    Hu, Ming
    Zhou, Junlong
    Wei, Tongquan
    Chen, Mingsong
    IEEE TRANSACTIONS ON RELIABILITY, 2020, 69 (01) : 188 - 202
  • [17] A Dynamic SQL Injection Vulnerability Test Case Generation Model Based on the Multiple Phases Detection Approach
    Liu Lei
    Xu Jing
    Li Minglei
    Yang Jufeng
    2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2013, : 256 - 261
  • [18] A Hybrid Method for Detection and Prevention of SQL Injection Attacks
    Ghafarian, Ahmad
    2017 COMPUTING CONFERENCE, 2017, : 833 - 838
  • [19] A second-order SQL injection detection method
    Ping, Chen
    PROCEEDINGS OF 2017 IEEE 2ND INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC), 2017, : 1792 - 1796
  • [20] SQLiDDS: SQL Injection Detection Using Query Transformation and Document Similarity
    Kar, Debabrata
    Panigrahi, Suvasini
    Sundararajan, Srikanth
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2015, 2015, 8956 : 377 - 390